javirandor / passgpt
☆56Updated last year
Alternatives and similar repositories for passgpt:
Users that are interested in passgpt are comparing it to the libraries listed below
- using ML models for red teaming☆42Updated last year
- We refined a GPT-3 model on Wattpad user account data to generate targeted password guesses automatically.☆67Updated 2 years ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆120Updated last year
- ☆35Updated 4 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21Updated 9 months ago
- An interactive CLI application for interacting with authenticated Jupyter instances.☆50Updated 11 months ago
- Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (…☆58Updated 10 months ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆88Updated 2 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆84Updated 2 months ago
- ☆84Updated 2 years ago
- Collection of hashcat lists and things.☆50Updated 5 years ago
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆27Updated 2 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆99Updated last year
- ☆36Updated last month
- Top hashpwn rules☆17Updated 2 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆32Updated 3 months ago
- Doppelgänger is firmware that runs on ESP32 devices that can be embedded within commercially available RFID readers with the intent of ca…☆14Updated 8 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆38Updated 5 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆29Updated 7 months ago
- A python3 script searching for secret on swaggerhub☆60Updated 2 years ago
- ☆27Updated last year
- Fast website scraper and wordlist generator☆75Updated last year
- keep watching new bug bounty (vulnerability) postings.☆12Updated 10 months ago
- Awesome products for securing AI systems includes open source and commercial options and an infographic licensed CC-BY-SA-4.0.☆58Updated 8 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆34Updated last week
- RLI Next Gen (Rling), a faster multi-threaded, feature rich alternative to rli found in hashcat utilities.☆85Updated last year
- This is the official repository for the code used in the paper: "What Was Your Prompt? A Remote Keylogging Attack on AI Assistants", USEN…☆42Updated 2 weeks ago
- Prompt Injections Everywhere☆103Updated 6 months ago
- A comprehensive list of aerospace affiliated CVEs 🚀👾⚠️☆21Updated 2 months ago