sean-t-smith / pwned-by-passgptLinks
Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (LLM).
☆64Updated last year
Alternatives and similar repositories for pwned-by-passgpt
Users that are interested in pwned-by-passgpt are comparing it to the libraries listed below
Sorting:
- A blind SQL injection brute forcer☆113Updated 7 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆107Updated 2 years ago
- ☆113Updated 3 years ago
- A powershell module for hiding payloads in the pixels of images☆78Updated last year
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆130Updated last year
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆135Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆26Updated 3 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated last year
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆44Updated 2 years ago
- [RELEASED] A CLI tool for large-scale password recovery operations using AWS☆29Updated 2 years ago
- A simple Python script to do quick, targeted recon of a given domain.☆58Updated 8 months ago
- ☆21Updated 2 years ago
- A collection of tools that I use in CTF's or for assessments☆103Updated 10 months ago
- Polymorphic Command & Control☆101Updated 9 months ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆35Updated last year
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆116Updated last year
- ☆20Updated 9 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆86Updated 3 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Updated last year
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated 3 weeks ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆136Updated last year
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84Updated 7 months ago
- Collections of past presentation slides☆14Updated 3 years ago
- A visual methodology tracking platform tailored for offensive security assessments☆233Updated 2 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆212Updated 3 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- :')☆46Updated 3 months ago
- Gather information from an email address connected to Office 365☆86Updated 2 years ago
- A real fake social engineering app☆128Updated 5 months ago