javirandor / passgpt
☆66Updated last month
Alternatives and similar repositories for passgpt:
Users that are interested in passgpt are comparing it to the libraries listed below
- Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (…☆61Updated last year
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated 11 months ago
- This is the official repository for the code used in the paper: "What Was Your Prompt? A Remote Keylogging Attack on AI Assistants", USEN…☆48Updated 2 months ago
- The notebook for my talk - ChatGPT: Your Red Teaming Ally☆47Updated last year
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆94Updated 4 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆123Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 8 months ago
- We refined a GPT-3 model on Wattpad user account data to generate targeted password guesses automatically.☆68Updated 2 years ago
- hashgen - the blazingly fast hash generator☆34Updated 2 weeks ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆33Updated 5 months ago
- ☆92Updated 2 years ago
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆27Updated last week
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆33Updated 10 months ago
- A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)☆106Updated 4 months ago
- Collection of hashcat lists and things.☆49Updated 5 years ago
- Hunting for passwords with deep learning☆212Updated 11 months ago
- ☆53Updated 3 months ago
- Training and testing of linguistic passwords models.☆25Updated 8 months ago
- ☆40Updated 11 months ago
- FETCH THE PASSWORD STRETCHER☆39Updated 2 years ago
- Top hashpwn rules☆19Updated 5 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Windows priviledge escalation script☆13Updated 2 months ago
- using ML models for red teaming☆43Updated last year
- ☆67Updated 2 years ago
- Cloud Exploit Framework☆113Updated 2 years ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆54Updated last month
- A curation of tools presented at DEF CON conference each year, the world's largest hacker con.☆32Updated last year
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆106Updated last year