Using RNNs for password cracking
☆87Mar 28, 2021Updated 4 years ago
Alternatives and similar repositories for RNN-Passwords
Users that are interested in RNN-Passwords are comparing it to the libraries listed below
Sorting:
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21May 7, 2024Updated last year
- RuraSort - A utility to sort and streamline wordlists.☆27Dec 22, 2019Updated 6 years ago
- Password lists generated by deep learning algorithms.☆34Jan 20, 2020Updated 6 years ago
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- Code for cracking passwords with neural networks☆242Dec 2, 2019Updated 6 years ago
- An android front-end to the zcash wallet through onion services☆14May 28, 2017Updated 8 years ago
- Experimentation with Highway Networks & GradNets☆13Dec 31, 2015Updated 10 years ago
- bip38-cracker, for this contest by casascius: https://bitcointalk.org/index.php?topic=128699.0☆22Dec 5, 2012Updated 13 years ago
- ☆16Dec 14, 2015Updated 10 years ago
- Machine-learn password mangling rules☆115Aug 18, 2023Updated 2 years ago
- Tools to convert Caffe models to neon's serialization format☆39Jan 3, 2023Updated 3 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Probabilistic Context Free Grammar (PCFG) password guess generator☆366Sep 2, 2025Updated 6 months ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- ☆13Apr 23, 2018Updated 7 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Security and Privacy Failures in Popular 2FA Apps☆20Oct 5, 2023Updated 2 years ago
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 10 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- A dsniff project using bro☆11Jan 25, 2016Updated 10 years ago
- ☆15Aug 11, 2020Updated 5 years ago
- Chrome extension that disables WebBluetooth☆14Mar 4, 2018Updated 8 years ago
- Modeling Password Guessability Using Markov Models☆58Jul 11, 2019Updated 6 years ago
- Analytics for Accounting logs from Network devices☆18Mar 27, 2021Updated 4 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 5 years ago
- Software for the paper "Gender and Lexical Variation in Social Media" with David Bamman and Tyler Schnoebelen☆17Nov 10, 2015Updated 10 years ago
- Repository for Chained Gaussian Processes☆14Apr 12, 2016Updated 9 years ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated 2 years ago
- Reimplementation of the clockwork recurrent neural network in Torch7☆14Feb 4, 2016Updated 10 years ago
- A framework for password-strength evaluation☆14Sep 26, 2020Updated 5 years ago
- Scrape pastes from pastebin and archive them for review☆17Mar 6, 2019Updated 7 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- IPLoM (Iterative Partitioning Log Mining) - Java☆15Mar 13, 2016Updated 9 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆17Aug 31, 2018Updated 7 years ago