sean-t-smith / pwned-by-passgpt
Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (LLM).
☆59Updated 11 months ago
Alternatives and similar repositories for pwned-by-passgpt:
Users that are interested in pwned-by-passgpt are comparing it to the libraries listed below
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆89Updated 2 months ago
- ☆87Updated 2 years ago
- ☆59Updated last year
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆123Updated last year
- A blind SQL injection brute forcer☆107Updated 3 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆97Updated last year
- A web scraping tool that extracts email addresses from multiple URLs listed in a file, or a simple url. It crawls through all page routes…☆44Updated 5 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated last month
- Crack passwords with Hashcat using a Discord Bot.☆24Updated last year
- ☆20Updated last year
- A powershell module for hiding payloads in the pixels of images☆57Updated 8 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆101Updated last year
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆77Updated 5 months ago
- Polymorphic Command & Control☆70Updated last week
- ☆22Updated this week
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆73Updated 7 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 7 months ago
- Tools and Resources for Physical Security Red Teaming☆31Updated 2 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆75Updated 5 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆32Updated 4 months ago
- A collection of tools that I use in CTF's or for assessments☆91Updated last month
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆17Updated 5 years ago
- Collection of hashcat lists and things.☆48Updated 5 years ago
- Windows priviledge escalation script☆13Updated last month
- A solution to create obfuscated reverse shells for PowerShell.☆76Updated 2 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆31Updated 8 months ago
- Script to perform some hashcracking logic automagically☆68Updated 9 months ago
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆84Updated 8 months ago
- ☆32Updated 3 months ago
- 🕵️ Email osint tool☆62Updated last year