Read and write TAR archives in Swift with this cross-platform, dependency-free library for high-performance data handling.
-
Updated
May 21, 2026 - Swift
Read and write TAR archives in Swift with this cross-platform, dependency-free library for high-performance data handling.
Explore and solve number puzzles with clear math patterns, probability checks, and puzzle analysis tools for curious minds
Build a real-time auction app with Flutter and Supabase for live bidding, secure auth, and a polished Material 3 UI
🤖 Explore AI and AGI applications in national security through Coursera’s SCSP Learning Program, building vital skills for a secure future.
Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.
A SOAP to gRPC translating proxy server for the NSI protocol.
RSA-2048 from scratch, Wiener's and Hastad's attacks, and a Kyber post-quantum KEM. NSA Stokes application project.
Ghidra Client/Server Docker Image
From-scratch reimplementation of DeepSeek's Native Sparse Attention (arXiv:2502.11089) in Triton + CUDA Hopper WGMMA. 7.4x faster than FlashAttention-3 at 64k context. Five-model training fleet, perplexity sweep, LongBench v2, MoBA comparison.
SDR web app dedicated to the NSA's highly unconstitutional neurotechnology 🧠 via advanced signals (dubbed N-APT) through infrastructure (Write → Read → Stream) to brainwaves and neuronal waves with incredibly high fidelity, high-bandwidth, rich and feature full experiences at the final frontier of neurotechnology.
Case files for Akwei v. NSA — court documents, defendant verification, NSA infrastructure, and technology patents
Comprehensive investigation into Akwei v. NSA (Civil Action 92-0449): defendant verification, technology documentation, NSA infrastructure analysis, court documents, and institutional connections.
AI based RTP listener
Mathematical theories and number anomalies
Browser-based demo of the Dual_EC_DRBG backdoor — the NSA-planted vulnerability confirmed by Snowden. The standard was compromised. Here's the proof.
This is about number puzzles in front of everyone - but nobody realizing! Alter warum 69? Warum nicht 96? Warum nicht 666b?
Research about the global network of NWO
This enigma-simulator project is an educational tool which simulates the workings of an [Enigma machine][wiki-enigma], the Germans' main military encryption tool during [World War II][wiki-ww2]. The software allows users to encrypt and decrypt messages.
This is a Free Coursera sequence of courses about AI and AGI in National Security by Special Competitive Studies Project. The Special Competitive Studies Project (SCSP) is a non-partisan, non-profit project covering: foreign policy, intelligence, defense, economy
[+] nls_933w.dll + [+] WIN32M.SYS MALWARE- ONLY FOR ACADEMICAL RESEARCH PURPOSES!
Add a description, image, and links to the nsa topic page so that developers can more easily learn about it.
To associate your repository with the nsa topic, visit your repo's landing page and select "manage topics."