Suxyuuu / PagPassGPT
PagPassGPT: Pattern Guided Password Guessing via Generative Pretrained Transformer
☆11Updated 3 months ago
Alternatives and similar repositories for PagPassGPT:
Users that are interested in PagPassGPT are comparing it to the libraries listed below
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Word split utility☆13Updated 6 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Fuzz Network Traffic☆18Updated 3 months ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago
- ☆19Updated last year
- Hash collisions and their exploitations☆9Updated 2 years ago
- reverse engineering, visual binary analysis☆24Updated 8 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆12Updated last year
- The Multiplatform Linux Sandbox☆15Updated last year
- Economics of Ransomware | Dataset☆15Updated 6 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated 10 months ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Updated 4 years ago
- ☆13Updated 4 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆9Updated last year
- ☆11Updated 5 years ago
- Abusing the FreeBSD MAC framework for rootkits☆11Updated 7 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Quantum Insert Backdoor POC☆11Updated 7 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆26Updated 3 years ago
- A tool to perform so called BGE attack☆24Updated 11 months ago
- Conceptual Methods for Finding Commonalities in Macho Files☆13Updated last year
- Python library for image hashing and deduplication☆11Updated 9 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 2 months ago