ponedo / rnnPassGAN-password-crackingLinks
Web安全技术课程大作业. 实现基于CNN和RNN的对抗生产网络模型(GANs), 尽可能多地猜测口令, 以攻破目标的口令。A password cracking model based on GAN, with RNN as its discriminator and generator. This model is enlightened by https://www.mdpi.com/1424-8220/20/11/3106, but honestly a really simple model.
☆29Updated 5 years ago
Alternatives and similar repositories for rnnPassGAN-password-cracking
Users that are interested in rnnPassGAN-password-cracking are comparing it to the libraries listed below
Sorting:
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated last year
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Updated 4 years ago
- A Library for Advanced DL-based Website Fingerprinting Attacks.☆156Updated 2 months ago
- ☆14Updated 2 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆56Updated 4 years ago
- Interactive, dynamic, and realistic LLM honeypots☆68Updated 9 months ago
- ☆81Updated 8 months ago
- The repository of TrafficLLM, a universal LLM adaptation framework to learn robust traffic representation for all open-sourced LLM in rea…☆371Updated 3 weeks ago
- ☆22Updated last year
- Modeling Password Guessability Using Markov Models☆57Updated 6 years ago
- NLP model and tech for cyber security tasks☆88Updated 2 years ago
- 这是作者恶意代码分析、网络安全、系统安全等系列教程,主要是通过机器学习、人工智能和深度学习来分析恶意代码的在线笔记。希望对您有所帮助,学无止境,一起加油。☆103Updated 5 years ago
- The repository of 6GAN, an IPv6 multi-pattern target generation algorithm using Generative Adversarial Nets with reinforcement learning. …☆21Updated 3 years ago
- 🔐 A list of anonymity papers published from 2012 to 2025.☆15Updated this week
- Trending Research Topics In Cybersecurity☆20Updated 5 years ago
- Training and testing of linguistic passwords models.☆27Updated last year
- 基于深度学习对dga恶意域名检测研究☆57Updated 2 years ago
- Source code for the data collection and analysis used in the 'How unique is your onion?' project.☆11Updated 7 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆67Updated 6 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆53Updated 3 years ago
- Full version of the paper "Transformer-based Model for Multi-tab Website Fingerprinting Attack", as well as the corresponding source code…☆25Updated 2 years ago
- Code for a password strength meter (PSM) with CKL_PCFG models and for memory pattern recognization☆15Updated 4 years ago
- Simple Latest CVE Collector Written in Python☆59Updated last year
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- This tool helps new security professionals actively learn how to address security concerns associated with open ports on a network device…☆22Updated 8 months ago
- ☆11Updated 3 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- 机器学习检测恶意URL改进版☆26Updated 5 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Updated last year
- A Test Project for a Network Security-oriented LLM Tool Emulating AutoGPT☆284Updated 2 years ago