Bijeeta / credtweak
Password attack and defense using deep neural networks
☆23Updated 2 years ago
Alternatives and similar repositories for credtweak
Users that are interested in credtweak are comparing it to the libraries listed below
Sorting:
- PassBertStrengthMeter is the open source library to apply BERT model to password evaluation.☆14Updated 2 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆54Updated 4 years ago
- Training and testing of linguistic passwords models.☆25Updated 8 months ago
- A Security Analysis of Honeywords☆15Updated 7 years ago
- Code for cracking passwords with neural networks☆233Updated 5 years ago
- Python version of the OMEN password cracker☆14Updated 5 months ago
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Hidden backdoor attack on NLP systems☆47Updated 3 years ago
- Code and data of the EMNLP 2021 paper "Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer"☆42Updated 2 years ago
- Official implementation of the EMNLP 2021 paper "ONION: A Simple and Effective Defense Against Textual Backdoor Attacks"☆33Updated 3 years ago
- codes for paper "learning to discriminate perturbations for blocking adversarial attacks in text classification" in EMNLP19☆15Updated 5 years ago
- NLP dataset: Chinese Android Privacy Policy Dataset☆22Updated 2 months ago
- Code for Findings of ACL 2021 "Differential Privacy for Text Analytics via Natural Text Sanitization"☆28Updated 3 years ago
- ☆19Updated last year
- Natural Language Attacks in a Hard Label Black Box Setting.☆47Updated 3 years ago
- LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins☆25Updated 9 months ago
- Web安全技术课程大作业. 实现基于CNN和RNN的对抗生产网络模型(GANs), 尽可能多地猜测口令, 以攻破目标的口令。A password cracking model based on GAN, with RNN as its discriminator and g…☆27Updated 4 years ago
- Code for the paper: "Adversarial Examples for Models of Code"☆17Updated 4 years ago
- ☆12Updated 6 years ago
- ☆26Updated 3 years ago
- ☆27Updated 4 years ago
- ☆9Updated 3 years ago
- Open-source code for RFCNLP paper.☆58Updated 2 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆146Updated 2 months ago
- NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces☆70Updated 9 months ago
- ☆13Updated 9 months ago
- ACM consolidated LaTeX styles☆67Updated 6 years ago
- collection of the SOTA linguistic steganalysis methods☆24Updated last year
- ☆30Updated last month