matteodellamico / montecarlopwdLinks
Monte Carlo password checking
☆11Updated 8 years ago
Alternatives and similar repositories for montecarlopwd
Users that are interested in montecarlopwd are comparing it to the libraries listed below
Sorting:
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated last year
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆56Updated 4 years ago
- Python version of the OMEN password cracker☆15Updated 8 months ago
- Training and testing of linguistic passwords models.☆27Updated last year
- ☆31Updated 3 years ago
- A framework for password-strength evaluation☆14Updated 4 years ago
- Password attack and defense using deep neural networks☆23Updated 3 years ago
- Probabilistic Context Free Grammar (PCFG) password guess generator☆344Updated 3 weeks ago
- A Security Analysis of Honeywords☆15Updated 7 years ago
- Code for a password strength meter (PSM) with CKL_PCFG models and for memory pattern recognization☆15Updated 3 years ago
- A collection of tools used for researching passwords☆18Updated 8 months ago
- Code for cracking passwords with neural networks☆237Updated 5 years ago
- Modeling Password Guessability Using Markov Models☆57Updated 6 years ago
- Word split utility☆13Updated 7 years ago
- ☆74Updated 5 months ago
- Password lists generated by deep learning algorithms.☆32Updated 5 years ago
- ☆17Updated 2 years ago
- RuraSort - A utility to sort and streamline wordlists.☆29Updated 5 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆62Updated 12 years ago
- Detect & filter duplicate hashcat rules☆45Updated 7 months ago
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- iWar - The intelligent war dialer.☆28Updated 5 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆12Updated 5 years ago
- Hunting cryptonote-related miners☆22Updated 4 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 8 years ago
- Analyze and modify hashcat .restore files☆31Updated 2 years ago