rchatterjee / nocrack
A new kind of password vault that fools the brute-force attacker by charning out decoy passwords.
☆26Updated 3 years ago
Related projects: ⓘ
- A Security Analysis of Honeywords☆14Updated 6 years ago
- A machine learning data analysis pipeline for analyzing website fingerprinting attacks and defenses.☆29Updated 7 years ago
- Privacy-preserving Tor statistics aggregation tool that implements the secret-sharing variant of the PrivEx algorithm.☆26Updated 3 years ago
- The Tor Path Simulator☆86Updated 7 years ago
- A python library that implements a number of Privacy Enhancing Technolgies☆130Updated last year
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆51Updated 3 years ago
- Scripts for CCS 2015 "Seeing through Network Protocol Obfuscation"☆24Updated 8 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21Updated 4 months ago
- MaxBib is a BibTeX database containing papers related to user authentication.☆8Updated 4 months ago
- Exercises in Privacy Enhancing Technologies (UCL Information Security MSc; Course COMPGA17)☆36Updated 4 years ago
- Hunting for Sybils and anomalies in archived Tor network data.☆43Updated 5 years ago
- Code for cracking passwords with neural networks☆224Updated 4 years ago
- A single script to facilitate submitting papers to ArXiv.org☆16Updated 6 years ago
- A utility to track the performance of Tor and Tor onion services☆19Updated 5 years ago
- Benchmarks for the k-FP WF attack☆30Updated 8 years ago
- Password attack and defense using deep neural networks☆21Updated 2 years ago
- A server-side Website Fingerprinting defence called "Application Layer Padding Concerns Adversaries"☆11Updated 5 years ago
- Frankencert - Adversarial Testing of Certificate Validation in SSL/TLS Implementations☆175Updated last year
- Freely available cryptographic iconography☆66Updated 7 years ago
- OMEN: Ordered Markov ENumerator - Password Guesser☆313Updated 5 years ago
- Command-line utility to control Tor.☆88Updated 9 months ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆62Updated 10 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆47Updated 8 years ago
- ☆23Updated 8 years ago
- ☆32Updated 10 years ago
- This is where we work on the newsletter☆28Updated 6 years ago
- Code supporting "Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail"☆34Updated 3 years ago
- A framework for password-strength evaluation☆13Updated 3 years ago
- Distributed, tamper-resistant circumvention tools☆48Updated 8 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 8 years ago