sean-t-smith / pwned-by-passgpt
Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (LLM).
☆58Updated 10 months ago
Alternatives and similar repositories for pwned-by-passgpt:
Users that are interested in pwned-by-passgpt are comparing it to the libraries listed below
- ☆55Updated last year
- A blind SQL injection brute forcer☆107Updated 2 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆118Updated last year
- ☆83Updated 2 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆95Updated last year
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆86Updated last month
- A collection of tools that I use in CTF's or for assessments☆89Updated last week
- A web scraping tool that extracts email addresses from multiple URLs listed in a file, or a simple url. It crawls through all page routes…☆43Updated 4 months ago
- Windows priviledge escalation script☆13Updated 2 weeks ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆433Updated 4 months ago
- Collections of past presentation slides☆12Updated 2 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆100Updated last year
- What the name says....☆89Updated 5 months ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆43Updated last year
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆103Updated last week
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆97Updated 6 months ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆32Updated 3 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆60Updated 5 months ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆32Updated 4 months ago
- A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging tech…☆17Updated 8 months ago
- OpenStreetMap Overpass Script to find locations with a given set of nodes☆51Updated last year
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆29Updated 7 months ago
- Information stealer logs parser☆51Updated 6 months ago
- ☆33Updated last month
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- A powershell module for hiding payloads in the pixels of images☆57Updated 7 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆85Updated last month
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆76Updated 5 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆139Updated 3 months ago