cupslab / neural_network_crackingLinks
Code for cracking passwords with neural networks
☆236Updated 5 years ago
Alternatives and similar repositories for neural_network_cracking
Users that are interested in neural_network_cracking are comparing it to the libraries listed below
Sorting:
- OMEN: Ordered Markov ENumerator - Password Guesser☆322Updated 6 years ago
- Metasploit for machine learning.☆570Updated 2 years ago
- Probabilistic Context Free Grammar (PCFG) password guess generator☆342Updated this week
- Using RNNs for password cracking☆87Updated 4 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆56Updated 4 years ago
- A Framework for Comparing Password Guessing Strategies☆127Updated 6 years ago
- A machine learning based social media pen-testing tool☆151Updated 8 years ago
- ☆93Updated 6 years ago
- Python version of the OMEN password cracker☆14Updated 7 months ago
- ☆29Updated 3 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆175Updated 5 years ago
- defplorex for BlackHat Arsenal☆116Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- RNN-LSTM that learns passwords from a starting list☆38Updated 8 years ago
- A framework for BREACH and other compression-based crypto attacks☆232Updated 5 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- Tool for breaking into web applications.☆92Updated 5 years ago
- A steganalysis tool for detecting LSB steganography in images☆220Updated 6 years ago
- Example code for our book Introduction to Artificial Intelligence for Security Professionals☆153Updated 6 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆216Updated 5 years ago
- Practical Keystroke Timing Attacks in Sandboxed JavaScript☆31Updated 8 years ago
- Word-generator based on per-position markov-chains☆175Updated last year
- As seen at DEF CON and O'Reilly Live Trainings☆24Updated 2 weeks ago
- A tool to predict vulnerability discovery of binary only programs☆187Updated 7 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Personal Information Exfiltration Detection Using Machine Learning☆29Updated 7 years ago
- Python bindings for hashcat☆61Updated 5 years ago