sean-t-smith / pwned-by-passgptLinks
Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (LLM).
☆63Updated last year
Alternatives and similar repositories for pwned-by-passgpt
Users that are interested in pwned-by-passgpt are comparing it to the libraries listed below
Sorting:
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆102Updated 7 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- ☆99Updated 2 years ago
- A powershell module for hiding payloads in the pixels of images☆61Updated last year
- Polymorphic Command & Control☆85Updated 4 months ago
- Script to perform some hashcracking logic automagically☆72Updated last year
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆44Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆218Updated 2 years ago
- Collection of hashcat lists and things.☆49Updated 5 years ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆129Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆33Updated last year
- A blind SQL injection brute forcer☆110Updated 2 months ago
- Advanced phishing tool, browser-based data capture, and realistic login page emulation.☆1Updated last month
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆34Updated 8 months ago
- ☆36Updated 7 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆77Updated 2 months ago
- ☆20Updated last year
- Gadget IoC removal from HAK5's BashBunny☆20Updated last year
- ☆15Updated 4 months ago
- ☆70Updated 4 months ago
- What the name says....☆101Updated 10 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆90Updated 11 months ago
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆100Updated 2 weeks ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆125Updated last year
- ☆67Updated last month
- CrackerJack / Hashcat Web Interface / Context Information Security☆54Updated 2 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆131Updated last year
- XSerum is a powerful web attack payload generator designed for red teamers, ethical hackers, and researchers. It supports a wide range of…☆18Updated 3 months ago
- :)))))☆46Updated last week