Popular repositories Loading
-
-
Pardazeh-18-6-Alternating
Pardazeh-18-6-Alternating PublicAlternate Data Streams (ADS) in NTFS allow multiple data streams to be associated with a single file. In addition to the main data stream, files can store extra data under different names. This fea…
-
Pardazeh-18-0-Enigma
Pardazeh-18-0-Enigma PublicThis is the first and main challenge of the puzzles in this issue of the Pardazeh magazine. You can find the configuration of the Enigma machine by solving the rest of the puzzles in the issue.
-
Pardazeh-18-1-NewCaesar
Pardazeh-18-1-NewCaesar PublicThe Caesar Cipher is one of the simplest encryption techniques. It's a type of substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.
Python
-
Pardazeh-18-2-SSC
Pardazeh-18-2-SSC PublicA simple substitution cipher is an encryption method where each letter in the plaintext is consistently replaced with a different letter. For example, if ‘A’ becomes ‘D’, all 'A’s in the message wi…
-
Pardazeh-18-3-Stego
Pardazeh-18-3-Stego PublicImage steganography is the technique of embedding concealed information within digital images, typically by modifying less noticeable components, such as the least significant bits of pixel values.…
Python
Repositories
- Pardazeh-18-0-Enigma Public
This is the first and main challenge of the puzzles in this issue of the Pardazeh magazine. You can find the configuration of the Enigma machine by solving the rest of the puzzles in the issue.
SBU-CS-Mag/Pardazeh-18-0-Enigma’s past year of commit activity - Pardazeh-18-8-ASCIIShift Public
ASCII (American Standard Code for Information Interchange) is a character encoding standard that represents text in computers using numeric codes. It assigns a unique number (ranging from 0 to 127) to each character, such as letters, digits, and symbols. For example, the letter "A" is represented by the number 65 in ASCII.
SBU-CS-Mag/Pardazeh-18-8-ASCIIShift’s past year of commit activity - Pardazeh-18-7-hex2ASCII Public
Hexadecimal is a number system based on 16 digits, using the numbers 0-9 and the letters A-F. Each digit represents a value from 0 to 15. It is commonly used in computing because it's more compact than binary and easier for humans to read, often representing data like colors, memory addresses, or machine code. For example, "A3" is equal to 163.
SBU-CS-Mag/Pardazeh-18-7-hex2ASCII’s past year of commit activity - Pardazeh-18-6-Alternating Public
Alternate Data Streams (ADS) in NTFS allow multiple data streams to be associated with a single file. In addition to the main data stream, files can store extra data under different names. This feature is often used for metadata but can also be exploited to hide information or malware within a file.
SBU-CS-Mag/Pardazeh-18-6-Alternating’s past year of commit activity - Pardazeh-18-5-226 Public
I'm sorry, but you already have everything you need to solve the challenge. There’s nothing more to say. The answer is waiting—trust your instincts and the hint you've been given. Good luck!
SBU-CS-Mag/Pardazeh-18-5-226’s past year of commit activity - Pardazeh-18-4-VisualCrypto Public
Visual cryptography is a unique encryption technique where a secret image is divided into multiple transparent shares. Individually, these shares appear as random patterns and reveal nothing about the original image. However, when stacked together, they reconstruct the hidden image without requiring any computational tools.
SBU-CS-Mag/Pardazeh-18-4-VisualCrypto’s past year of commit activity - Pardazeh-18-3-Stego Public
Image steganography is the technique of embedding concealed information within digital images, typically by modifying less noticeable components, such as the least significant bits of pixel values. This ensures the image retains its original appearance while securely encoding hidden data.
SBU-CS-Mag/Pardazeh-18-3-Stego’s past year of commit activity - Pardazeh-18-2-SSC Public
A simple substitution cipher is an encryption method where each letter in the plaintext is consistently replaced with a different letter. For example, if ‘A’ becomes ‘D’, all 'A’s in the message will be encoded as 'D’s. While easy to use, it can be cracked through frequency analysis, making it a popular puzzle in cryptography.
SBU-CS-Mag/Pardazeh-18-2-SSC’s past year of commit activity - Pardazeh-18-1-NewCaesar Public
The Caesar Cipher is one of the simplest encryption techniques. It's a type of substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.
SBU-CS-Mag/Pardazeh-18-1-NewCaesar’s past year of commit activity - SBU-CS-Mag Public
SBU-CS-Mag/SBU-CS-Mag’s past year of commit activity