thoppe / 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8Links
RNN-LSTM that learns passwords from a starting list
☆38Updated 8 years ago
Alternatives and similar repositories for 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
Users that are interested in 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 are comparing it to the libraries listed below
Sorting:
- Code for cracking passwords with neural networks☆235Updated 5 years ago
- Using RNNs for password cracking☆86Updated 4 years ago
- Using Ordered Markov Chains and User Information to Speed up Password Cracking☆27Updated 8 years ago
- Spying using Smartwatch and Deep Learning☆189Updated 8 years ago
- OMEN: Ordered Markov ENumerator - Password Guesser☆323Updated 6 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 2 years ago
- A machine learning based social media pen-testing tool☆150Updated 8 years ago
- ☆80Updated 8 years ago
- ☆22Updated 6 years ago
- ☆24Updated 3 years ago
- ☆11Updated 7 years ago
- Learning the Enigma with Recurrent Neural Networks☆161Updated 2 years ago
- A specialized database server for linear algebra and machine learning.☆86Updated 2 years ago
- A recurrent neural network trained with tweets from #cyber #security companies☆68Updated 9 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- ☆12Updated 8 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- Neural Networks that invent their own encryption☆195Updated 6 years ago
- Metasploit for machine learning.☆566Updated 2 years ago
- Perceptual Hashing Image Similarity Framework☆31Updated 5 years ago
- Antivirus Demo for Fresh Machine Learning #7☆107Updated 4 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Programmer De-anonymization from Binary Executables☆86Updated 7 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated last year
- p2p peer-to-peer training of tensorflow models☆63Updated 8 years ago
- ☆168Updated 6 years ago
- Java implementation of Lempel-Ziv Jaccard Distance☆21Updated 7 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 6 years ago