sean-t-smith / pwned-by-passgptLinks
Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (LLM).
☆65Updated last year
Alternatives and similar repositories for pwned-by-passgpt
Users that are interested in pwned-by-passgpt are comparing it to the libraries listed below
Sorting:
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆109Updated 2 years ago
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆135Updated 2 weeks ago
- A blind SQL injection brute forcer☆113Updated 9 months ago
- A powershell module for hiding payloads in the pixels of images☆77Updated last year
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆137Updated 2 years ago
- ☆118Updated 3 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated 2 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆28Updated 4 months ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- ☆43Updated last year
- Polymorphic Command & Control☆102Updated 10 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Updated version of n0kovo's Rule List☆44Updated this week
- Script to perform some hashcracking logic automagically☆80Updated 2 months ago
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Updated last year
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆35Updated last year
- Educational Linux privilege escalation script for CTFs/OSCP. Explains WHAT/WHY/HOW for every vulnerability found. Highlights critical fin…☆48Updated 3 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆215Updated 3 months ago
- A real fake social engineering app☆130Updated 6 months ago
- [RELEASED] A CLI tool for large-scale password recovery operations using AWS☆29Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆97Updated last year
- A visual methodology tracking platform tailored for offensive security assessments☆237Updated 4 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆115Updated last year
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84Updated 8 months ago
- What the name says....☆104Updated last year
- A collection of tools that I use in CTF's or for assessments☆107Updated 11 months ago