faizann24 / Using-Ordered-Markov-Chains-and-User-Information-to-Speed-up-Password-CrackingLinks
Using Ordered Markov Chains and User Information to Speed up Password Cracking
☆27Updated 8 years ago
Alternatives and similar repositories for Using-Ordered-Markov-Chains-and-User-Information-to-Speed-up-Password-Cracking
Users that are interested in Using-Ordered-Markov-Chains-and-User-Information-to-Speed-up-Password-Cracking are comparing it to the libraries listed below
Sorting:
- Using RNNs for password cracking☆87Updated 4 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 7 years ago
- Packet Acumen☆19Updated 11 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Updated 10 years ago
- Collection of scripts that were once useful for reverse engineering things☆75Updated 15 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- Web based code browser using clang to provide basic code analysis.☆46Updated 8 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆79Updated 11 years ago
- ☆12Updated 10 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Updated 8 years ago
- Slides, Papers, Links to CVEs and advisories☆77Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆48Updated last year
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Updated 10 years ago
- ☆35Updated 13 years ago
- Some slides from some presentations I have given☆25Updated 10 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 8 years ago
- My utils written for Reverse Engineering, mainly in python☆49Updated 11 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 9 years ago
- Collection of software bugs found by SkyLined☆68Updated 9 years ago
- ☆25Updated 10 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago