sean-t-smith / pwned-by-passgptLinks
Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (LLM).
☆64Updated last year
Alternatives and similar repositories for pwned-by-passgpt
Users that are interested in pwned-by-passgpt are comparing it to the libraries listed below
Sorting:
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆127Updated 11 months ago
- ☆111Updated 3 years ago
- A powershell module for hiding payloads in the pixels of images☆79Updated last year
- A blind SQL injection brute forcer☆114Updated 7 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆107Updated 2 years ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆134Updated last year
- XSerum is a powerful web attack payload generator designed for red teamers, ethical hackers, and researchers. It supports a wide range of…☆20Updated 7 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Updated this week
- Living Off The Land (LOTL) persistent Reverse shell☆103Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 2 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆25Updated 2 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆58Updated 7 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆114Updated last year
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆35Updated last year
- A visual methodology tracking platform tailored for offensive security assessments☆226Updated last month
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆46Updated 2 years ago
- [RELEASED] A CLI tool for large-scale password recovery operations using AWS☆29Updated 2 years ago
- Collection of hashcat lists and things.☆52Updated 5 years ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆46Updated 3 weeks ago
- ☆81Updated 8 months ago
- ☆42Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Polymorphic Command & Control☆100Updated 8 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆135Updated last year
- A real fake social engineering app☆128Updated 4 months ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆34Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- :')☆46Updated 3 months ago
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆49Updated last year
- Gather information from an email address connected to Office 365☆86Updated 2 years ago