thoppe / 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
RNN-LSTM that learns passwords from a starting list
☆38Updated 8 years ago
Alternatives and similar repositories for 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8:
Users that are interested in 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 are comparing it to the libraries listed below
- Using RNNs for password cracking☆86Updated 4 years ago
- Code for cracking passwords with neural networks☆232Updated 5 years ago
- Using Ordered Markov Chains and User Information to Speed up Password Cracking☆27Updated 8 years ago
- ☆24Updated 3 years ago
- Char-level RNN LSTM password cracker 🔑🔓.☆56Updated 3 years ago
- A recurrent neural network trained with tweets from #cyber #security companies☆68Updated 8 years ago
- Spying using Smartwatch and Deep Learning☆189Updated 7 years ago
- ☆22Updated 5 years ago
- Programmer De-anonymization via Code Stylometry☆77Updated 7 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- Contextual RNN-GANs for Abstract Reasoning Diagram Generation☆30Updated 6 years ago
- Perform basic NLP of popular subreddits to understand trending topics☆11Updated 10 years ago
- A bot tweeting nonsensical craft beer reviews via Markov chains☆49Updated 9 years ago
- Markov-chain password generator☆13Updated 7 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- A Framework for Comparing Password Guessing Strategies☆127Updated 5 years ago
- LSTM with associative memory cells (http://arxiv.org/abs/1602.03032)☆109Updated 8 years ago
- MITIE: library and tools for information extraction☆29Updated 10 years ago
- Javascript neural networks on top of general scalar/tensor reverse-mode automatic differentiation.☆234Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- A convolutional neural network for images recognition☆23Updated 6 years ago
- Meta information for the DARPA open catalog project.☆54Updated 7 years ago
- A Security Analysis of Honeywords☆15Updated 7 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- Your Access To Data☆73Updated 2 years ago
- p2p peer-to-peer training of tensorflow models☆63Updated 8 years ago
- Social Media Data Mining and Analytics - HyperLogLog, BloomFilter and CountMinSketch with Scalding & Algebird☆27Updated 6 years ago
- Bitsquat Domain Generation Script☆57Updated 5 years ago
- Model Training tool for MITIE☆79Updated 9 years ago
- An analysis of historical Hacker News data to determine the ranking algorithm☆85Updated 8 years ago