rchatterjee / nocrackLinks
A new kind of password vault that fools the brute-force attacker by charning out decoy passwords.
☆26Updated 4 years ago
Alternatives and similar repositories for nocrack
Users that are interested in nocrack are comparing it to the libraries listed below
Sorting:
- A Security Analysis of Honeywords☆15Updated 7 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆30Updated 8 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆133Updated 2 years ago
- The Tor Path Simulator☆86Updated 8 years ago
- Hunting for Sybils and anomalies in archived Tor network data.☆44Updated 6 years ago
- OnionTip is a web app which parses Tor relay data to allow users to tip volunteers for running relay in a fair and open way.☆54Updated 7 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Python version of the OMEN password cracker☆14Updated 5 months ago
- DEPRECATED – See NOTICE below about migration to new repository – Post-quantum key exchange from the ring learning with errors problem i…☆9Updated 8 years ago
- Command-line utility to control Tor.☆89Updated last year
- Exercises in Privacy Enhancing Technologies (UCL Information Security MSc; Course COMPGA17)☆38Updated 5 years ago
- ☆24Updated 9 years ago
- Code for a password strength meter (PSM) with CKL_PCFG models and for memory pattern recognization☆14Updated 3 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Updated 6 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- OMEN: Ordered Markov ENumerator - Password Guesser☆321Updated 5 years ago
- Security and Privacy Assurance Research Test and Assessment (SPARTA) tool suite☆37Updated 8 years ago
- WARNING: Deprecated! See Privacy Pass☆98Updated 8 years ago
- ☆58Updated 8 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆54Updated 4 years ago
- Proof-of-concept implementation of a cryptographic multilinear maps on the integers☆12Updated 3 years ago
- A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website …☆25Updated 11 months ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- Elliptic Curve Cryptography playground/toolkit written in pure Python☆67Updated 2 years ago
- A Shadow plug-in that runs the Tor anonymity software☆50Updated 3 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆25Updated 9 years ago
- Project repository for creating padding machines for Tor to defend against website fingerprinting☆22Updated 4 years ago
- MaxBib is a BibTeX database containing papers related to user authentication.☆8Updated 3 months ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆118Updated 8 years ago
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago