sean-t-smith / pwned-by-passgptLinks
Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (LLM).
☆65Updated last year
Alternatives and similar repositories for pwned-by-passgpt
Users that are interested in pwned-by-passgpt are comparing it to the libraries listed below
Sorting:
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆133Updated last year
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆136Updated 2 years ago
- ☆117Updated 3 years ago
- A blind SQL injection brute forcer☆113Updated 8 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆27Updated 3 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆108Updated 2 years ago
- A powershell module for hiding payloads in the pixels of images☆76Updated last year
- [RELEASED] A CLI tool for large-scale password recovery operations using AWS☆29Updated 2 years ago
- Educational Linux privilege escalation script for CTFs/OSCP. Explains WHAT/WHY/HOW for every vulnerability found. Highlights critical fin…☆48Updated 3 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆117Updated last year
- A collection of tools that I use in CTF's or for assessments☆104Updated 11 months ago
- ☆83Updated 9 months ago
- A visual methodology tracking platform tailored for offensive security assessments☆236Updated 3 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆87Updated 4 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated last year
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated last month
- Polymorphic Command & Control☆101Updated 10 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Updated last year
- OneWordlistToListThemAll is a huge mix of password wordlists, proven to be pretty useful to provide some quick hits when cracking several…☆120Updated this week
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- ☆41Updated last year
- A real fake social engineering app☆129Updated 5 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆64Updated 8 months ago
- Collections of past presentation slides☆14Updated 3 years ago
- What the name says....☆104Updated last year
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆86Updated 6 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆224Updated 2 years ago
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆121Updated 4 months ago
- ☆20Updated 10 months ago