sean-t-smith / pwned-by-passgptLinks
Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (LLM).
☆62Updated last year
Alternatives and similar repositories for pwned-by-passgpt
Users that are interested in pwned-by-passgpt are comparing it to the libraries listed below
Sorting:
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆98Updated 6 months ago
- ☆97Updated 2 years ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆128Updated last year
- A blind SQL injection brute forcer☆109Updated 2 months ago
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆92Updated this week
- ☆68Updated 3 months ago
- A powershell module for hiding payloads in the pixels of images☆61Updated 11 months ago
- [RELEASED] A CLI tool for large-scale password recovery operations using AWS☆29Updated last year
- Advanced phishing tool, browser-based data capture, and realistic login page emulation.☆1Updated 2 weeks ago
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆74Updated last month
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- Script to perform some hashcracking logic automagically☆71Updated last year
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆34Updated 7 months ago
- A curation of tools presented at DEF CON conference each year, the world's largest hacker con.☆33Updated last year
- ☆64Updated 3 weeks ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆75Updated last month
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 11 months ago
- Collection of hashcat lists and things.☆49Updated 5 years ago
- A web scraping tool that extracts email addresses from multiple URLs listed in a file, or a simple url. It crawls through all page routes…☆45Updated 8 months ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆21Updated 3 years ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆86Updated 10 months ago
- ☆41Updated last year
- Browser streaming MITM proxy☆65Updated last year
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆33Updated 8 months ago
- ☆20Updated last year
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆33Updated last year
- Monitor 802.11 probe requests from a capture file or network sniffing!☆33Updated 4 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆218Updated 2 years ago
- Crappy Golang code to list local listening ports and their associated processes.☆31Updated 2 years ago