pkusec / rethinking-honeywordsLinks
A Security Analysis of Honeywords
☆15Updated 7 years ago
Alternatives and similar repositories for rethinking-honeywords
Users that are interested in rethinking-honeywords are comparing it to the libraries listed below
Sorting:
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated last year
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆55Updated 4 years ago
- Python version of the OMEN password cracker☆14Updated 7 months ago
- Query 'GreyNoise Intelligence 'API' in R☆14Updated 5 years ago
- Analyst tool for creating pivot maps of data sources☆17Updated 7 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Code for cracking passwords with neural networks☆235Updated 5 years ago
- ☆29Updated 3 years ago
- API public documentation☆9Updated 6 years ago
- Code for a password strength meter (PSM) with CKL_PCFG models and for memory pattern recognization☆14Updated 3 years ago
- Probabilistic Context Free Grammar (PCFG) password guess generator☆340Updated 7 months ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆26Updated last year
- Useful tools for working with the PassiveTotal API in R☆13Updated 9 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Economics of Ransomware | Dataset☆15Updated 7 years ago
- Farsight Security Blog code☆9Updated last year
- Universal Honey Pot☆29Updated 2 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Updated 6 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- Low-interaction VNC honeypot with a static challenge.☆22Updated 5 years ago
- Dockerized eMobility for use in T-Pot☆18Updated 7 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- Identifies phishing websites using a treebag model☆22Updated 4 years ago
- ☆9Updated last year
- ☆13Updated 7 years ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- ☆12Updated 8 years ago
- Utility for binary searching a sorted file for lines that start with the search key☆18Updated 7 years ago