brannondorsey / PassGAN
A Deep Learning Approach for Password Guessing (https://arxiv.org/abs/1709.00440)
☆1,796Updated last year
Alternatives and similar repositories for PassGAN:
Users that are interested in PassGAN are comparing it to the libraries listed below
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,315Updated last month
- Veil 3.1.X (Check version info in Veil at runtime)☆4,038Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,235Updated 3 months ago
- Common User Passwords Profiler (CUPP)☆4,590Updated last year
- Efficient and advanced man in the middle framework☆2,059Updated last year
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,575Updated 4 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,580Updated 4 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,697Updated 2 months ago
- UFONet - Denial of Service Toolkit☆2,252Updated 4 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,773Updated 11 months ago
- A script that you can run in the background!☆2,779Updated 5 months ago
- NSE script based on Vulners.com API☆3,252Updated 9 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,665Updated last month
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,596Updated 3 months ago
- Powerful framework for rogue access point attack.☆2,042Updated last year
- Crack hashes in seconds.☆1,775Updated last month
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,070Updated this week
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,474Updated this week
- Crack password hashes without the fuss☆1,257Updated 3 years ago
- E-mails, subdomains and names Harvester - OSINT☆11,818Updated this week
- OMEN: Ordered Markov ENumerator - Password Guesser☆316Updated 5 years ago
- Undetectable Windows Payload Generation☆1,567Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,054Updated 2 months ago
- Attack Surface Management Platform☆8,321Updated 2 weeks ago
- Python antivirus evasion tool☆1,397Updated last year
- Exploitation Framework for Embedded Devices☆12,305Updated this week
- hydra☆9,964Updated 5 months ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,744Updated 2 years ago
- RockYou2021.txt is a MASSIVE WORDLIST compiled of various other wordlists. RockYou2021.txt DOES NOT CONTAIN USER:PASS logins!☆916Updated 10 months ago
- An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S0…☆805Updated 3 months ago