javirandor / passgptLinks
☆77Updated 7 months ago
Alternatives and similar repositories for passgpt
Users that are interested in passgpt are comparing it to the libraries listed below
Sorting:
- Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (…☆62Updated last year
- Visualize BBOT scans in realtime with VivaGraphJS☆56Updated 11 months ago
- We refined a GPT-3 model on Wattpad user account data to generate targeted password guesses automatically.☆72Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆25Updated last week
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Updated 11 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆114Updated last year
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆118Updated 10 months ago
- Legba recipes.☆51Updated last year
- Collection of hashcat lists and things.☆52Updated 5 years ago
- A new web frontend for Hashtopolis☆39Updated this week
- top usernames from azure survey 2025☆14Updated 5 months ago
- hashgen - the blazingly fast hash generator☆38Updated last week
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Updated 3 years ago
- ☆23Updated 4 years ago
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆83Updated 5 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆103Updated last year
- A distributed hashcat implementation using Salad Cloud and Hashtopolis☆40Updated last year
- This is the official repository for the code used in the paper: "What Was Your Prompt? A Remote Keylogging Attack on AI Assistants", USEN…☆59Updated 8 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆142Updated 10 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆136Updated last year
- ☆42Updated last year
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆23Updated last month
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆27Updated 2 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆12Updated 2 years ago
- Hunting for passwords with deep learning☆228Updated last year
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆58Updated 2 years ago