pkusec / rethinking-honeywordsLinks
A Security Analysis of Honeywords
☆15Updated 8 years ago
Alternatives and similar repositories for rethinking-honeywords
Users that are interested in rethinking-honeywords are comparing it to the libraries listed below
Sorting:
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆56Updated 4 years ago
- ☆31Updated 4 years ago
- Python version of the OMEN password cracker☆17Updated last year
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated last year
- Code for a password strength meter (PSM) with CKL_PCFG models and for memory pattern recognization☆15Updated 4 years ago
- API public documentation☆10Updated 7 years ago
- Probabilistic Context Free Grammar (PCFG) password guess generator☆361Updated 3 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Updated last year
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Code for cracking passwords with neural networks☆241Updated 6 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Updated 5 years ago
- ☆10Updated last year
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 3 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Updated 2 years ago
- Dockerized eMobility for use in T-Pot☆18Updated 8 years ago
- ☆14Updated last year
- Update to The Measurement Factory ipv4-heatmap codebase☆34Updated 8 years ago
- Universal Honey Pot☆29Updated 3 months ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Updated 7 years ago
- first commit☆20Updated 3 months ago
- Analyst tool for creating pivot maps of data sources☆16Updated 8 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Monte Carlo password checking☆11Updated 8 years ago
- R package for working with data stored within VERIS framework☆13Updated 9 years ago
- Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"☆18Updated last year
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Full Packet Capture for the Masses☆14Updated 7 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 5 years ago
- Tools to Obtain and Work with Cloud Provider CIDR Blocks in R☆17Updated 7 years ago