faizann24 / Using-Ordered-Markov-Chains-and-User-Information-to-Speed-up-Password-Cracking
Using Ordered Markov Chains and User Information to Speed up Password Cracking
☆27Updated 7 years ago
Alternatives and similar repositories for Using-Ordered-Markov-Chains-and-User-Information-to-Speed-up-Password-Cracking:
Users that are interested in Using-Ordered-Markov-Chains-and-User-Information-to-Speed-up-Password-Cracking are comparing it to the libraries listed below
- Using RNNs for password cracking☆86Updated 3 years ago
- Packet Acumen☆19Updated 10 years ago
- All related files and slides for past talks☆44Updated last year
- ☆24Updated 9 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- ☆12Updated 9 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 6 years ago
- ELF header abuse☆46Updated 8 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 6 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Verification Validation and Visualization of Security Policy Abstractions☆43Updated last year
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Security tools to use on assessments.☆39Updated 8 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Updated 9 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆34Updated 7 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- ☆17Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 2 months ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Updated 8 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 8 years ago
- LPE exploits for Secret Net and Secret Net Studio☆51Updated 8 years ago