faizann24 / Using-Ordered-Markov-Chains-and-User-Information-to-Speed-up-Password-CrackingLinks
Using Ordered Markov Chains and User Information to Speed up Password Cracking
☆27Updated 8 years ago
Alternatives and similar repositories for Using-Ordered-Markov-Chains-and-User-Information-to-Speed-up-Password-Cracking
Users that are interested in Using-Ordered-Markov-Chains-and-User-Information-to-Speed-up-Password-Cracking are comparing it to the libraries listed below
Sorting:
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Using RNNs for password cracking☆86Updated 4 years ago
- Packet Acumen☆19Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- ☆24Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆21Updated 10 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- ☆12Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- CVE-2015-2231 POC☆10Updated 9 years ago
- Code for the paper EvilCoder: Automated Bug Insertion at ACSAC 2016☆46Updated 8 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Source code for the beta release of CobraDroid☆14Updated 5 years ago
- ELF header abuse☆48Updated 9 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Updated 10 years ago
- eSentire additions to the nmap network scanner☆13Updated 9 years ago
- ☆51Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 3 months ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- ☆36Updated 12 years ago