matteodellamico / montecarlopwdLinks
Monte Carlo password checking
☆11Updated 7 years ago
Alternatives and similar repositories for montecarlopwd
Users that are interested in montecarlopwd are comparing it to the libraries listed below
Sorting:
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆56Updated 4 years ago
- Python version of the OMEN password cracker☆14Updated 7 months ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated last year
- ☆29Updated 3 years ago
- Training and testing of linguistic passwords models.☆26Updated 11 months ago
- A Security Analysis of Honeywords☆15Updated 7 years ago
- Password attack and defense using deep neural networks☆23Updated 3 years ago
- A collection of tools used for researching passwords☆18Updated 7 months ago
- A framework for password-strength evaluation☆14Updated 4 years ago
- MaxBib is a BibTeX database containing papers related to user authentication.☆8Updated last week
- Code for a password strength meter (PSM) with CKL_PCFG models and for memory pattern recognization☆14Updated 3 years ago
- Probabilistic Context Free Grammar (PCFG) password guess generator☆342Updated this week
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- Code for cracking passwords with neural networks☆236Updated 5 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- A dictionary-based AES brute forcer that targets weak key generation.☆7Updated 5 years ago
- Modeling Password Guessability Using Markov Models☆57Updated 6 years ago
- Virustotal Data to Timesketch☆17Updated 6 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆16Updated 6 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆54Updated 7 years ago
- ☆22Updated 10 years ago
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆37Updated last week
- emotet configs pulled from https://cape.contextis.com/☆15Updated 3 years ago
- Advices to look for malicious software on your devices☆17Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- Command Line STDOUT Colorer☆30Updated 4 years ago
- ☆71Updated 5 months ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆62Updated 12 years ago