rarecoil / ai-passwordsView external linksLinks
Password lists generated by deep learning algorithms.
☆34Jan 20, 2020Updated 6 years ago
Alternatives and similar repositories for ai-passwords
Users that are interested in ai-passwords are comparing it to the libraries listed below
Sorting:
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆86Nov 6, 2019Updated 6 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- A collection of expired domains previously blocked by Russia's Roskomnadzor, now available for free registration. Reclaim the web! 🌐🔓☆11Feb 7, 2026Updated last week
- Configuration tool for AMD Overdrive6 devices.☆20Mar 7, 2016Updated 9 years ago
- Extract Unique Word Lists From Wikipedia Database☆13May 27, 2020Updated 5 years ago
- HOLM (Hashes.Org Left Manager)☆12Feb 23, 2016Updated 9 years ago
- Scrape pastes from pastebin and archive them for review☆17Mar 6, 2019Updated 6 years ago
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- large hashcat rulesets generated from real-world compromised passwords☆399Nov 26, 2020Updated 5 years ago
- A collection of hacks and one-off scripts☆18Jun 4, 2021Updated 4 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228☆17Dec 15, 2021Updated 4 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- Rockyou for web fuzzing☆15Jan 28, 2022Updated 4 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21May 7, 2024Updated last year
- Wireless Pentesting Device☆24Aug 14, 2020Updated 5 years ago
- Hastopolis Server Docker image☆19May 5, 2023Updated 2 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Feb 26, 2021Updated 4 years ago
- The Cloud Blocker☆108Feb 16, 2025Updated last year
- Dump of all my hash-cracking related stuffs.☆23May 16, 2019Updated 6 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Nov 19, 2023Updated 2 years ago
- Decode Hashcat '$HEX[]' password output from a password list containing a mixture of non-encoded and encoded passwords☆24Mar 1, 2019Updated 6 years ago
- Password analysis software☆38Jun 24, 2015Updated 10 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆36Jul 22, 2021Updated 4 years ago
- RuraSort - A utility to sort and streamline wordlists.☆27Dec 22, 2019Updated 6 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆56Mar 19, 2021Updated 4 years ago
- Hashcat wrapper to help automate the cracking process☆118Apr 16, 2018Updated 7 years ago
- Most common AWS S3 bucket names.☆28Jun 2, 2020Updated 5 years ago
- Whole house water leak detection and water shutoff system. Requires a supervisory computer for full functionality. Communications is via…☆10Mar 16, 2025Updated 11 months ago
- Wordpress Deploy on HEROKU☆11Jul 12, 2022Updated 3 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Dumping LSASS by Unhooking MiniDumpWriteDump by getting a fresh DbgHelp.dll copy from the disk , plus functions and strings obfuscation☆31Sep 24, 2022Updated 3 years ago
- wordlists for password cracking☆28Aug 15, 2022Updated 3 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Hashcat Benchmark Comparison☆28Jun 28, 2021Updated 4 years ago
- Token2 TOTP Toolset - local☆34Nov 27, 2025Updated 2 months ago
- Analyze and modify hashcat .restore files☆33Nov 19, 2022Updated 3 years ago