sean-t-smith / pwned-by-passgptLinks
Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (LLM).
☆63Updated last year
Alternatives and similar repositories for pwned-by-passgpt
Users that are interested in pwned-by-passgpt are comparing it to the libraries listed below
Sorting:
- Hascat Rules Collection – Probably the largest collection of hashcat rule-files anywhere.☆102Updated 7 months ago
- A set of prioritized Hashcat .hcmask files intelligently developed from terabytes of password breach datasets and organized by run time.☆129Updated last year
- ☆99Updated 2 years ago
- A blind SQL injection brute forcer☆109Updated 3 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Create n-grams of wordlists based on words, characters, or charsets to use in offline password attacks and data analysis☆34Updated last year
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- ☆70Updated 4 months ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆44Updated last year
- Polymorphic Command & Control☆86Updated 5 months ago
- A powershell module for hiding payloads in the pixels of images☆65Updated last year
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆33Updated 10 months ago
- A visual methodology tracking platform tailored for offensive security assessments☆176Updated this week
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆35Updated 9 months ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆22Updated 2 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆186Updated 5 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆153Updated 6 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆200Updated last month
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆77Updated 2 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆206Updated 4 months ago
- Collection of hashcat lists and things.☆49Updated 5 years ago
- Open-Source Phishing Toolkit☆216Updated 3 weeks ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆91Updated last year
- A tool for automating WPA3-Transition Mode Downgrade Attack also known as Dragonblood Vulnerability☆25Updated 11 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆78Updated 3 years ago
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆513Updated 9 months ago
- Browser streaming MITM proxy☆68Updated last year
- ☆301Updated last year