pkusec / rethinking-honeywordsLinks
A Security Analysis of Honeywords
☆15Updated 7 years ago
Alternatives and similar repositories for rethinking-honeywords
Users that are interested in rethinking-honeywords are comparing it to the libraries listed below
Sorting:
- ☆29Updated 3 years ago
- Python version of the OMEN password cracker☆14Updated 7 months ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆56Updated 4 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Updated last year
- Query 'GreyNoise Intelligence 'API' in R☆14Updated 5 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated last year
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Updated 6 years ago
- API public documentation☆9Updated 6 years ago
- Probabilistic Context Free Grammar (PCFG) password guess generator☆342Updated this week
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Farsight Security Blog code☆9Updated last year
- ☆10Updated last year
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆26Updated last year
- Analyst tool for creating pivot maps of data sources☆17Updated 7 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Universal Honey Pot☆29Updated 2 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Economics of Ransomware | Dataset☆15Updated 7 years ago
- Code for cracking passwords with neural networks☆236Updated 5 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Updated 8 years ago
- Low-interaction VNC honeypot with a static challenge.☆22Updated 6 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Code for a password strength meter (PSM) with CKL_PCFG models and for memory pattern recognization☆14Updated 3 years ago
- Dockerized eMobility for use in T-Pot☆18Updated 7 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- MaxBib is a BibTeX database containing papers related to user authentication.☆8Updated last week
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- ☆22Updated 10 years ago
- ☆14Updated last year
- Highly parallel, GPU-accelerated hybrid mergesort with mmap'd IO☆44Updated 6 years ago