snow0011 / CKL_PSMLinks
Code for a password strength meter (PSM) with CKL_PCFG models and for memory pattern recognization
☆14Updated 3 years ago
Alternatives and similar repositories for CKL_PSM
Users that are interested in CKL_PSM are comparing it to the libraries listed below
Sorting:
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated last year
- A Security Analysis of Honeywords☆15Updated 7 years ago
- Guessing passwords via Representation Learning, with style and a mixture of gaussians☆54Updated 4 years ago
- Modeling Password Guessability Using Markov Models☆57Updated 5 years ago
- ☆29Updated 3 years ago
- Python version of the OMEN password cracker☆14Updated 6 months ago
- PagPassGPT: Pattern Guided Password Guessing via Generative Pretrained Transformer☆11Updated 6 months ago
- Password attack and defense using deep neural networks☆23Updated 2 years ago
- PassBertStrengthMeter is the open source library to apply BERT model to password evaluation.☆15Updated 2 years ago
- Monte Carlo password checking☆11Updated 7 years ago
- MaxBib is a BibTeX database containing papers related to user authentication.☆8Updated 4 months ago
- Web安全技术课程大作业. 实现基于CNN和RNN的对抗生产网络模型(GANs), 尽可能多地猜测口令, 以攻破目标的口令。A password cracking model based on GAN, with RNN as its discriminator and g…☆27Updated 4 years ago
- Training and testing of linguistic passwords models.☆26Updated 10 months ago
- A framework for password-strength evaluation☆14Updated 4 years ago
- ☆16Updated 2 years ago
- ☆37Updated 4 years ago
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- Word split utility☆13Updated 7 years ago
- ☆68Updated 3 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆13Updated last year
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- A CHaracter Aware Splitting Method for producing password candidates.☆41Updated 7 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆62Updated 12 years ago
- Historic password hashing algorithms☆17Updated 5 years ago
- Monitor hashcat potfile for statistics☆8Updated last year
- A Framework for Comparing Password Guessing Strategies☆127Updated 5 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Password lists generated by deep learning algorithms.☆30Updated 5 years ago
- ☆24Updated 4 years ago
- Prototype private key hashing agent☆16Updated 7 years ago