ponedo / rnnPassGAN-password-crackingView external linksLinks
Web安全技术课程大作业. 实现基于CNN和RNN的对抗生产网络模型(GANs), 尽可能多地猜测口令, 以攻破目标的口令。A password cracking model based on GAN, with RNN as its discriminator and generator. This model is enlightened by https://www.mdpi.com/1424-8220/20/11/3106, but honestly a really simple model.
☆30Nov 13, 2020Updated 5 years ago
Alternatives and similar repositories for rnnPassGAN-password-cracking
Users that are interested in rnnPassGAN-password-cracking are comparing it to the libraries listed below
Sorting:
- Training and testing of linguistic passwords models.☆27Aug 20, 2024Updated last year
- ☆18Mar 14, 2023Updated 2 years ago
- Experimenting with PassGAN for password cracking☆22Dec 12, 2018Updated 7 years ago
- Modeling Password Guessability Using Markov Models☆58Jul 11, 2019Updated 6 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆56Mar 19, 2021Updated 4 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Jan 7, 2020Updated 6 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- ☆10Mar 11, 2024Updated last year
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- ☆12Jul 4, 2024Updated last year
- Python script that downloads all cracked passwords from leaks on hashes.org and merges them into a single wordlist.txt file.☆39Apr 9, 2021Updated 4 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Alternative front-end for Google Translate☆12Nov 10, 2023Updated 2 years ago
- ☆10Mar 6, 2023Updated 2 years ago
- ☆22Aug 29, 2025Updated 5 months ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- Highly parallel, GPU-accelerated hybrid mergesort with mmap'd IO☆45Feb 21, 2019Updated 6 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- ☆18May 27, 2025Updated 8 months ago
- 基于Python+Flask+MySQL的数据微中台,支持数据库管理、数据收集(某乎爬虫等)等功能☆10Sep 4, 2020Updated 5 years ago
- Convert OpenVPN into Socks5 via Docker 将 OpenVPN 协议转为 Socks 协议,支持同时多开多个 OpenVPN 客户端,解决不同工作环境 OpenVPN 内网同时访问问题☆12Mar 13, 2024Updated last year
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- SSE to Stdio MCP Proxy Server☆17Jun 9, 2025Updated 8 months ago
- 红方人员作战执行手册☆11Feb 22, 2020Updated 5 years ago
- A plugin for Obsidian that allows the creation of symlinks - for Windows, OS X and Linux only!☆13Oct 31, 2024Updated last year
- python模拟登陆csdn☆11Jun 23, 2017Updated 8 years ago
- Mining Server Detector of Cryptocurrency Pools☆10Jan 5, 2023Updated 3 years ago
- automated censorship evasion for the client-side and server-side☆11Sep 5, 2021Updated 4 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- ☆15Apr 20, 2020Updated 5 years ago
- A PoC C2 implementation that uses Native Messaging API to execute direct commands in the OS☆17Nov 5, 2025Updated 3 months ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 8 months ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Convert files to qr codes and a video of them (and back)☆11May 8, 2022Updated 3 years ago
- ☆13Jun 27, 2022Updated 3 years ago