faizann24 / Using-Ordered-Markov-Chains-and-User-Information-to-Speed-up-Password-CrackingView external linksLinks
Using Ordered Markov Chains and User Information to Speed up Password Cracking
☆27Feb 19, 2017Updated 8 years ago
Alternatives and similar repositories for Using-Ordered-Markov-Chains-and-User-Information-to-Speed-up-Password-Cracking
Users that are interested in Using-Ordered-Markov-Chains-and-User-Information-to-Speed-up-Password-Cracking are comparing it to the libraries listed below
Sorting:
- HLS OSMF plugin - help to view m3u8 streams in the KDP/V2 player☆14Nov 16, 2020Updated 5 years ago
- Chrome 扩展,为百度搜索添加必应壁纸。☆11Jun 29, 2015Updated 10 years ago
- ☆11Apr 13, 2017Updated 8 years ago
- Various Jeb plugins, including obfuscation restore☆15Jun 3, 2015Updated 10 years ago
- Some xposed modules☆16Nov 27, 2018Updated 7 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Use back camera capturing make WeChat's message content page's background transparent☆12Aug 17, 2016Updated 9 years ago
- ☆21Dec 20, 2012Updated 13 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- This a rewrite of dep_utils(adep/cdep/ldep) which is provided by John Lakos' book Large-Scale C++ Software Design.☆19Sep 20, 2023Updated 2 years ago
- Binaries for Python 2.7 M2Crypto under Windows☆20Jul 31, 2014Updated 11 years ago
- Android getevent ported to Linux☆20Nov 6, 2015Updated 10 years ago
- A demo to show how to install Xposed and enable Xposed based module automatically☆29Nov 2, 2014Updated 11 years ago
- ☆19Jan 26, 2016Updated 10 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Load a Windows Kernel Driver☆94Jun 7, 2017Updated 8 years ago
- Password lists generated by deep learning algorithms.☆34Jan 20, 2020Updated 6 years ago
- appid_bypass from bbs.pediy.com☆26Jun 7, 2017Updated 8 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- Automatically exported from code.google.com/p/chrome-redirector☆21Jul 28, 2015Updated 10 years ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- Implementing an illusion number transform.☆25Oct 29, 2015Updated 10 years ago
- Phishing scams are more rampant than ever — and I wanted to do something about it. Over the last few weeks, I’ve been working on a proje…☆17Sep 8, 2025Updated 5 months ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Jan 2, 2020Updated 6 years ago
- Browser Fuzzing Framework ,浏览器Fuzzing 框架..☆31Jun 17, 2016Updated 9 years ago
- Nginx module that allows user to lookup for geolocation information using IP2Location database.☆33Jan 3, 2024Updated 2 years ago
- a simple discord app token grabber in batch which is fully undetected☆10Aug 9, 2022Updated 3 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- ☆42Jul 1, 2016Updated 9 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- 360云盘存储SDK [ clouddisk sdk for 360 ]☆28May 8, 2017Updated 8 years ago
- Netfilter NFQUEUE high-level bindings☆41Sep 17, 2018Updated 7 years ago
- CS-FW is a high-performance CS 1.6 firewall based on Linux XDP.☆11Aug 15, 2023Updated 2 years ago
- 利用京东接口直接在微信中打开我们的落地页,如公众号二维码,个人二维码,有效转换☆32Nov 5, 2018Updated 7 years ago
- New phishing tool with 30+ templates updated tool☆10Feb 2, 2024Updated 2 years ago
- CyberSniff Desktop Client☆18Jul 13, 2022Updated 3 years ago
- Run Ubuntu with pre-installed Desktop Environments in android/termux with ease! Everything is preinstalled so just download install and d…☆10Jul 20, 2022Updated 3 years ago
- It is a bot that sends reports about people stealing their Codes rights And they say they are programmers etc☆10Aug 31, 2021Updated 4 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 5 months ago