gehaxelt / RNN-Passwords
Using RNNs for password cracking
☆86Updated 4 years ago
Alternatives and similar repositories for RNN-Passwords:
Users that are interested in RNN-Passwords are comparing it to the libraries listed below
- Using Ordered Markov Chains and User Information to Speed up Password Cracking☆27Updated 8 years ago
- A Framework for Comparing Password Guessing Strategies☆126Updated 5 years ago
- All related files and slides for past talks☆44Updated last year
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Updated 10 years ago
- Hashcat Bash Scripts for bulk hash file processing☆52Updated 8 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 9 years ago
- A Bayesian Method for the Induction of Probalistic Networks from Data☆18Updated 7 years ago
- Tensorflow implementation of the paper "A Neural Algorithm of Artistic Style"☆25Updated 8 years ago
- Code for cracking passwords with neural networks☆231Updated 5 years ago
- RNN-LSTM that learns passwords from a starting list☆38Updated 7 years ago
- Repository for team's work on the Microsoft Malware Classification Challenge Kaggle competition.☆11Updated 10 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Word split utility☆13Updated 6 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- ☆33Updated 8 years ago
- disthc☆27Updated 10 years ago
- ☆24Updated 3 years ago
- Learning to Discover Efficient Mathematical Identities☆48Updated 10 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 7 years ago
- ☆17Updated 9 years ago
- OMEN: Ordered Markov ENumerator - Password Guesser☆317Updated 5 years ago
- Tools for 802.11 information gathering.☆119Updated 2 years ago
- ☆19Updated 10 years ago
- The Zonefile Transfer Toolkit☆28Updated 3 weeks ago
- ☆45Updated 7 years ago
- Deep neural network implemented with gnumpy/cudamat☆16Updated 11 years ago
- Advanced virtual host bruteforcer☆31Updated 9 years ago