OMEN: Ordered Markov ENumerator - Password Guesser
☆330Jul 11, 2019Updated 6 years ago
Alternatives and similar repositories for OMEN
Users that are interested in OMEN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Probabilistic Context Free Grammar (PCFG) password guess generator☆366Sep 2, 2025Updated 7 months ago
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- A Framework for Comparing Password Guessing Strategies☆129Jul 11, 2019Updated 6 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21May 7, 2024Updated last year
- Modeling Password Guessability Using Markov Models☆58Jul 11, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆56Mar 19, 2021Updated 5 years ago
- Code for cracking passwords with neural networks☆242Dec 2, 2019Updated 6 years ago
- Training and testing of linguistic passwords models.☆27Aug 20, 2024Updated last year
- Password attack and defense using deep neural networks☆24Aug 3, 2022Updated 3 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆12Aug 13, 2020Updated 5 years ago
- ☆32Nov 22, 2021Updated 4 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- Monte Carlo password checking☆11Aug 14, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of tools used for researching passwords☆19Dec 17, 2024Updated last year
- RuraSort - A utility to sort and streamline wordlists.☆27Dec 22, 2019Updated 6 years ago
- Standalone password candidate generator using the PRINCE algorithm☆483Oct 30, 2023Updated 2 years ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆244Sep 13, 2021Updated 4 years ago
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆95Apr 3, 2026Updated last week
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆562Jan 3, 2017Updated 9 years ago
- A Security Analysis of Honeywords☆16Nov 28, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- PACK (Password Analysis and Cracking Kit)☆872Dec 10, 2019Updated 6 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- Authenticate against a MySQL server without knowing the cleartext password☆229Apr 16, 2022Updated 3 years ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Web安全技术课程大作业. 实现基于CNN和RNN的对抗生产网络模型(GANs), 尽可能多地猜测口令, 以攻破目标的口令。A password cracking model based on GAN, with RNN as its discriminator and g…☆31Nov 13, 2020Updated 5 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Generate Keyboard Walk Dictionaries for cracking☆148Feb 16, 2016Updated 10 years ago
- Using RNNs for password cracking☆87Mar 28, 2021Updated 5 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,116Apr 26, 2020Updated 5 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆23Jul 1, 2015Updated 10 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 4 months ago