thoppe / 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8Links
RNN-LSTM that learns passwords from a starting list
☆38Updated 8 years ago
Alternatives and similar repositories for 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
Users that are interested in 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 are comparing it to the libraries listed below
Sorting:
- Code for cracking passwords with neural networks☆240Updated 5 years ago
- Using RNNs for password cracking☆87Updated 4 years ago
- Spying using Smartwatch and Deep Learning☆189Updated 8 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 7 years ago
- OMEN: Ordered Markov ENumerator - Password Guesser☆329Updated 6 years ago
- Your Access To Data☆73Updated 3 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- ☆24Updated 3 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- ☆12Updated 8 years ago
- ☆22Updated 6 years ago
- Programmer De-anonymization from Binary Executables☆88Updated 7 years ago
- A recurrent neural network trained with tweets from #cyber #security companies☆68Updated 9 years ago
- Metasploit for machine learning.☆572Updated 2 years ago
- Resume data and scripts for managing it☆91Updated 8 years ago
- ☆80Updated 9 years ago
- MITIE: library and tools for information extraction☆29Updated 10 years ago
- A framework for BREACH and other compression-based crypto attacks☆235Updated 5 years ago
- Cybersecurity Mobile Investigation Workstation, a C++ Map-Reduce for Log Analysis☆32Updated 8 years ago
- Distributed File Storage Using JavaScript Botnets☆114Updated 12 years ago
- Neural Networks that invent their own encryption☆196Updated 6 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 3 years ago
- Using Ordered Markov Chains and User Information to Speed up Password Cracking☆27Updated 8 years ago
- Meta information for the DARPA open catalog project.☆56Updated 8 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- Chrome extension for zero-hour phishing protection☆18Updated 4 years ago
- Mass IPv4 WHOIS Collection Tool☆18Updated 9 years ago
- p2p peer-to-peer training of tensorflow models☆62Updated 8 years ago
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Updated 10 years ago