m33x / MaxBibLinks
MaxBib is a BibTeX database containing papers related to user authentication.
☆8Updated 3 months ago
Alternatives and similar repositories for MaxBib
Users that are interested in MaxBib are comparing it to the libraries listed below
Sorting:
- ☆29Updated 3 years ago
- Python version of the OMEN password cracker☆14Updated 5 months ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- A Security Analysis of Honeywords☆15Updated 7 years ago
- Tools for timing attacks☆18Updated 9 years ago
- List of crackpot 'scientists' and 'thinkers'☆19Updated last week
- Generic ASN.1 decoder/encoder to a structured text syntax☆49Updated 3 years ago
- ☆13Updated 4 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 4 years ago
- Code for the paper "Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC" [ACM SIG…☆23Updated 4 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- ☆12Updated 5 years ago
- ☆45Updated 10 months ago
- Bleichenbachers "Million message attack" on RSA in Python☆28Updated 4 years ago
- This is a Tamarin model of TLS 1.3☆37Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- Word split utility☆13Updated 6 years ago
- ☆35Updated 8 years ago
- 5 cves of ntp 4.2.8p15 founded by me.☆12Updated 2 years ago
- Polyglot detector☆21Updated this week
- Conceptual Methods for Finding Commonalities in Macho Files☆12Updated last year
- A history of PGP-related vulnerabilities☆24Updated 3 years ago
- Improved Search for Integral, Impossible Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRE…☆13Updated 2 months ago
- ☆11Updated 4 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- A stand-alone implementation of Hashcat's rule engine☆34Updated 8 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆36Updated 3 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated last year