Skip to content
Change the repository type filter

All

    Repositories list

    • CafeCS

      Public
      Café CS is a weekly webinar series organized by the Scientific Association of Computer Science at Shahid Beheshti University. Each one-hour session features talks by computer enthusiasts, students, and professionals who share insights on diverse computer science topics—from foundational concepts to emerging technologies.
      TypeScript
      0400Updated Dec 14, 2025Dec 14, 2025
    • CSSASBU

      Public
      0100Updated Nov 23, 2025Nov 23, 2025
    • This is the first and main challenge of the puzzles in this issue of the Pardazeh magazine. You can find the configuration of the Enigma machine by solving the rest of the puzzles in the issue.
      0000Updated Feb 25, 2025Feb 25, 2025
    • ASCII (American Standard Code for Information Interchange) is a character encoding standard that represents text in computers using numeric codes. It assigns a unique number (ranging from 0 to 127) to each character, such as letters, digits, and symbols. For example, the letter "A" is represented by the number 65 in ASCII.
      Python
      0000Updated Dec 26, 2024Dec 26, 2024
    • Hexadecimal is a number system based on 16 digits, using the numbers 0-9 and the letters A-F. Each digit represents a value from 0 to 15. It is commonly used in computing because it's more compact than binary and easier for humans to read, often representing data like colors, memory addresses, or machine code. For example, "A3" is equal to 163.
      Python
      0000Updated Dec 26, 2024Dec 26, 2024
    • Alternate Data Streams (ADS) in NTFS allow multiple data streams to be associated with a single file. In addition to the main data stream, files can store extra data under different names. This feature is often used for metadata but can also be exploited to hide information or malware within a file.
      0100Updated Dec 26, 2024Dec 26, 2024
    • I'm sorry, but you already have everything you need to solve the challenge. There’s nothing more to say. The answer is waiting—trust your instincts and the hint you've been given. Good luck!
      0000Updated Dec 26, 2024Dec 26, 2024
    • Visual cryptography is a unique encryption technique where a secret image is divided into multiple transparent shares. Individually, these shares appear as random patterns and reveal nothing about the original image. However, when stacked together, they reconstruct the hidden image without requiring any computational tools.
      Python
      0000Updated Dec 26, 2024Dec 26, 2024
    • Image steganography is the technique of embedding concealed information within digital images, typically by modifying less noticeable components, such as the least significant bits of pixel values. This ensures the image retains its original appearance while securely encoding hidden data.
      Python
      0000Updated Dec 26, 2024Dec 26, 2024
    • A simple substitution cipher is an encryption method where each letter in the plaintext is consistently replaced with a different letter. For example, if ‘A’ becomes ‘D’, all 'A’s in the message will be encoded as 'D’s. While easy to use, it can be cracked through frequency analysis, making it a popular puzzle in cryptography.
      0000Updated Dec 26, 2024Dec 26, 2024
    • The Caesar Cipher is one of the simplest encryption techniques. It's a type of substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.
      Python
      0000Updated Dec 26, 2024Dec 26, 2024