rchatterjee / nocrack
A new kind of password vault that fools the brute-force attacker by charning out decoy passwords.
☆26Updated 3 years ago
Alternatives and similar repositories for nocrack:
Users that are interested in nocrack are comparing it to the libraries listed below
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 6 years ago
- ☆26Updated 3 years ago
- A Security Analysis of Honeywords☆15Updated 7 years ago
- free crypto audit☆31Updated 7 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- A test framework for testing SSL/TLS client certificate validation.☆95Updated 3 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆132Updated 2 years ago
- OMEN: Ordered Markov ENumerator - Password Guesser☆316Updated 5 years ago
- The Tor Path Simulator☆86Updated 8 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆29Updated 7 years ago
- Tor consensus and server descriptor parser☆13Updated 2 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆54Updated 3 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Updated 5 years ago
- Artifacts for the USENIX publication.☆57Updated 5 years ago
- Code for cracking passwords with neural networks☆229Updated 5 years ago
- XPIR: Private Information Retrieval for Everyone☆116Updated 3 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 5 years ago
- A framework for password-strength evaluation☆14Updated 4 years ago
- Check Diffie Hellman group prime parameter☆11Updated 8 years ago
- Password attack and defense using deep neural networks☆23Updated 2 years ago
- Command-line utility to control Tor.☆89Updated last year
- A CONIKS implementation in Java☆60Updated 6 years ago
- Cryptography: a proof-of-concept attack against the MAC-then-encrypt scheme☆7Updated 9 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆117Updated 7 years ago
- Put files in Certificate Transparency logs and pull them back out☆18Updated 5 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 4 years ago
- Exercises in Privacy Enhancing Technologies (UCL Information Security MSc; Course COMPGA17)☆37Updated 4 years ago
- A single script to facilitate submitting papers to ArXiv.org☆17Updated 6 years ago