m33x / MaxBib
MaxBib is a BibTeX database containing papers related to user authentication.
☆8Updated 2 months ago
Alternatives and similar repositories for MaxBib:
Users that are interested in MaxBib are comparing it to the libraries listed below
- ☆26Updated 3 years ago
- A Security Analysis of Honeywords☆15Updated 7 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21Updated 8 months ago
- Python version of the OMEN password cracker☆14Updated last month
- Tools for timing attacks☆18Updated 9 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆14Updated 6 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Updated 4 years ago
- List of crackpot 'scientists' and 'thinkers'☆14Updated 5 months ago
- A single script to facilitate submitting papers to ArXiv.org☆17Updated 6 years ago
- Utility for binary searching a sorted file for lines that start with the search key☆18Updated 6 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Updated 3 years ago
- Word split utility☆13Updated 6 years ago
- A history of PGP-related vulnerabilities☆23Updated 3 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 7 years ago
- Golang implementation of PyMISP-feedgenerator☆16Updated 2 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 2 years ago
- This is where we work on the newsletter☆28Updated 7 years ago
- Effort to list and aggregate known malicious Google Chrome Extension IDs☆51Updated 2 years ago
- A stand-alone implementation of Hashcat's rule engine☆34Updated 8 years ago
- Forensics triage tool relying on Volatility and Foremost☆24Updated last year
- ☆39Updated 3 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆26Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated 2 years ago
- Analytics for Accounting logs from Network devices☆16Updated 3 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated this week
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago