Skip to content

Popular repositories Loading

  1. SBU-CS-Mag SBU-CS-Mag Public

    1

  2. Pardazeh-18-6-Alternating Pardazeh-18-6-Alternating Public

    Alternate Data Streams (ADS) in NTFS allow multiple data streams to be associated with a single file. In addition to the main data stream, files can store extra data under different names. This fea…

    1

  3. Pardazeh-18-0-Enigma Pardazeh-18-0-Enigma Public

    This is the first and main challenge of the puzzles in this issue of the Pardazeh magazine. You can find the configuration of the Enigma machine by solving the rest of the puzzles in the issue.

  4. Pardazeh-18-1-NewCaesar Pardazeh-18-1-NewCaesar Public

    The Caesar Cipher is one of the simplest encryption techniques. It's a type of substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.

    Python

  5. Pardazeh-18-2-SSC Pardazeh-18-2-SSC Public

    A simple substitution cipher is an encryption method where each letter in the plaintext is consistently replaced with a different letter. For example, if ‘A’ becomes ‘D’, all 'A’s in the message wi…

  6. Pardazeh-18-3-Stego Pardazeh-18-3-Stego Public

    Image steganography is the technique of embedding concealed information within digital images, typically by modifying less noticeable components, such as the least significant bits of pixel values.…

    Python

Repositories

Showing 10 of 10 repositories
  • Pardazeh-18-0-Enigma Public

    This is the first and main challenge of the puzzles in this issue of the Pardazeh magazine. You can find the configuration of the Enigma machine by solving the rest of the puzzles in the issue.

    SBU-CS-Mag/Pardazeh-18-0-Enigma’s past year of commit activity
    0 MIT 0 0 0 Updated Feb 25, 2025
  • Pardazeh-18-8-ASCIIShift Public

    ASCII (American Standard Code for Information Interchange) is a character encoding standard that represents text in computers using numeric codes. It assigns a unique number (ranging from 0 to 127) to each character, such as letters, digits, and symbols. For example, the letter "A" is represented by the number 65 in ASCII.

    SBU-CS-Mag/Pardazeh-18-8-ASCIIShift’s past year of commit activity
    Python 0 MIT 0 0 0 Updated Dec 26, 2024
  • Pardazeh-18-7-hex2ASCII Public

    Hexadecimal is a number system based on 16 digits, using the numbers 0-9 and the letters A-F. Each digit represents a value from 0 to 15. It is commonly used in computing because it's more compact than binary and easier for humans to read, often representing data like colors, memory addresses, or machine code. For example, "A3" is equal to 163.

    SBU-CS-Mag/Pardazeh-18-7-hex2ASCII’s past year of commit activity
    Python 0 MIT 0 0 0 Updated Dec 26, 2024
  • Pardazeh-18-6-Alternating Public

    Alternate Data Streams (ADS) in NTFS allow multiple data streams to be associated with a single file. In addition to the main data stream, files can store extra data under different names. This feature is often used for metadata but can also be exploited to hide information or malware within a file.

    SBU-CS-Mag/Pardazeh-18-6-Alternating’s past year of commit activity
    1 MIT 0 0 0 Updated Dec 26, 2024
  • Pardazeh-18-5-226 Public

    I'm sorry, but you already have everything you need to solve the challenge. There’s nothing more to say. The answer is waiting—trust your instincts and the hint you've been given. Good luck!

    SBU-CS-Mag/Pardazeh-18-5-226’s past year of commit activity
    0 MIT 0 0 0 Updated Dec 26, 2024
  • Pardazeh-18-4-VisualCrypto Public

    Visual cryptography is a unique encryption technique where a secret image is divided into multiple transparent shares. Individually, these shares appear as random patterns and reveal nothing about the original image. However, when stacked together, they reconstruct the hidden image without requiring any computational tools.

    SBU-CS-Mag/Pardazeh-18-4-VisualCrypto’s past year of commit activity
    Python 0 MIT 0 0 0 Updated Dec 26, 2024
  • Pardazeh-18-3-Stego Public

    Image steganography is the technique of embedding concealed information within digital images, typically by modifying less noticeable components, such as the least significant bits of pixel values. This ensures the image retains its original appearance while securely encoding hidden data.

    SBU-CS-Mag/Pardazeh-18-3-Stego’s past year of commit activity
    Python 0 MIT 0 0 0 Updated Dec 26, 2024
  • Pardazeh-18-2-SSC Public

    A simple substitution cipher is an encryption method where each letter in the plaintext is consistently replaced with a different letter. For example, if ‘A’ becomes ‘D’, all 'A’s in the message will be encoded as 'D’s. While easy to use, it can be cracked through frequency analysis, making it a popular puzzle in cryptography.

    SBU-CS-Mag/Pardazeh-18-2-SSC’s past year of commit activity
    0 MIT 0 0 0 Updated Dec 26, 2024
  • Pardazeh-18-1-NewCaesar Public

    The Caesar Cipher is one of the simplest encryption techniques. It's a type of substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.

    SBU-CS-Mag/Pardazeh-18-1-NewCaesar’s past year of commit activity
    Python 0 MIT 0 0 0 Updated Dec 26, 2024
  • SBU-CS-Mag Public
    SBU-CS-Mag/SBU-CS-Mag’s past year of commit activity
    1 0 0 0 Updated Sep 8, 2024

Top languages

Loading…

Most used topics

Loading…