sean-t-smith / pwned-by-passgpt
Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (LLM).
☆60Updated 11 months ago
Alternatives and similar repositories for pwned-by-passgpt:
Users that are interested in pwned-by-passgpt are comparing it to the libraries listed below
- ☆60Updated 3 weeks ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆90Updated 3 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆123Updated last year
- ☆90Updated 2 years ago
- A blind SQL injection brute forcer☆108Updated 4 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆32Updated 5 months ago
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸☆49Updated 4 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year
- ☆22Updated 3 weeks ago
- Windows priviledge escalation script☆13Updated 2 months ago
- A collection of tools that I use in CTF's or for assessments☆95Updated 2 months ago
- A real fake social engineering app☆103Updated 3 weeks ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆75Updated 6 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆266Updated last year
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆32Updated 9 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆67Updated last week
- Polymorphic Command & Control☆74Updated 3 weeks ago
- ☆38Updated 3 months ago
- Tools and Resources for Physical Security Red Teaming☆31Updated 2 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆85Updated 7 months ago
- A web scraping tool that extracts email addresses from multiple URLs listed in a file, or a simple url. It crawls through all page routes…☆44Updated 6 months ago
- PowerShell Obfuscator☆125Updated 9 months ago
- EyeSpy is a PowerShell tool for finding IP Cameras and spraying credentials at the underlying RTSP streams if present.☆77Updated 6 months ago
- Autofill Phishing☆64Updated 3 months ago
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆74Updated 5 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆116Updated last week
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆119Updated last year
- Collection of hashcat lists and things.☆48Updated 5 years ago