m33x / MaxBib
MaxBib is a BibTeX database containing papers related to user authentication.
☆8Updated last month
Alternatives and similar repositories for MaxBib:
Users that are interested in MaxBib are comparing it to the libraries listed below
- ☆27Updated 3 years ago
- Python version of the OMEN password cracker☆14Updated 3 months ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated 11 months ago
- A Security Analysis of Honeywords☆15Updated 7 years ago
- Tools for timing attacks☆18Updated 9 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 4 years ago
- ☆12Updated 5 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- Word split utility☆13Updated 6 years ago
- ☆11Updated 4 years ago
- ☆13Updated 4 years ago
- ☆20Updated 5 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 7 years ago
- A stand-alone implementation of Hashcat's rule engine☆34Updated 8 years ago
- A tool/framework for analyzing hostname verification in SSL/TLS implementations using automata learning☆21Updated 7 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆10Updated 9 years ago
- Minimal Indicator Storage System☆11Updated 4 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Generic ASN.1 decoder/encoder to a structured text syntax☆48Updated 3 years ago
- ☆10Updated last month
- A Tamarin model and analysis of EMV☆30Updated 4 years ago
- ☆35Updated 8 years ago
- MAYO C implementation☆16Updated last week
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- An effective attack against the Argon2i hash function☆9Updated 7 years ago
- Auditing Applied Cryptography☆10Updated 5 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆14Updated 6 years ago