Can we create a list of tools that we can use to pen-test such systems, or even break simple encryptions π