gehaxelt / RNN-Passwords
Using RNNs for password cracking
☆86Updated 3 years ago
Alternatives and similar repositories for RNN-Passwords:
Users that are interested in RNN-Passwords are comparing it to the libraries listed below
- Using Ordered Markov Chains and User Information to Speed up Password Cracking☆27Updated 7 years ago
- A Framework for Comparing Password Guessing Strategies☆124Updated 5 years ago
- ☆33Updated 8 years ago
- ☆24Updated 3 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Tools for 802.11 information gathering.☆118Updated 2 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Updated 10 years ago
- Damn Small FI Scanner☆60Updated 5 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Random repo of machine learning ideas orchestrated in python☆142Updated 6 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆95Updated 2 years ago
- Learning to Discover Efficient Mathematical Identities☆48Updated 10 years ago
- Packet Acumen☆19Updated 10 years ago
- Hashcat Bash Scripts for bulk hash file processing☆52Updated 8 years ago
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 6 years ago
- Password cracking utility☆53Updated 3 years ago
- ☆17Updated 9 years ago
- All related files and slides for past talks☆44Updated last year
- Spiders a website using the darknet via Tor☆12Updated 7 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Repository for team's work on the Microsoft Malware Classification Challenge Kaggle competition.☆11Updated 9 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- OMEN: Ordered Markov ENumerator - Password Guesser☆316Updated 5 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- ☆27Updated 7 years ago
- Identifies phishing websites using a treebag model☆22Updated 4 years ago
- A Bayesian Method for the Induction of Probalistic Networks from Data☆18Updated 7 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆120Updated 9 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago