thoppe / 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8Links
RNN-LSTM that learns passwords from a starting list
☆38Updated 8 years ago
Alternatives and similar repositories for 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
Users that are interested in 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 are comparing it to the libraries listed below
Sorting:
- Using RNNs for password cracking☆87Updated 4 years ago
- Code for cracking passwords with neural networks☆241Updated 6 years ago
- Using Ordered Markov Chains and User Information to Speed up Password Cracking☆27Updated 8 years ago
- Metasploit for machine learning.☆572Updated 2 years ago
- OMEN: Ordered Markov ENumerator - Password Guesser☆328Updated 6 years ago
- A recurrent neural network trained with tweets from #cyber #security companies☆68Updated 9 years ago
- Distributed File Storage Using JavaScript Botnets☆114Updated 12 years ago
- Spying using Smartwatch and Deep Learning☆188Updated 8 years ago
- Beating the benchmark for Microsoft Malware Classification Challenge (BIG 2015)☆28Updated 10 years ago
- Learning the Enigma with Recurrent Neural Networks☆164Updated 3 years ago
- Analysis of archived Tor relay RSA public keys☆24Updated 8 years ago
- ☆80Updated 9 years ago
- An evolutionary framework for evading machine learning-based malware classifiers.☆110Updated 3 years ago
- MITIE: library and tools for information extraction☆29Updated 10 years ago
- Neural Networks that invent their own encryption☆196Updated 6 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- Probabilistic Context Free Grammar (PCFG) password guess generator☆361Updated 3 months ago
- BotFlex is an open source tool or bot detection and analysis☆60Updated 12 years ago
- ☆24Updated 3 years ago
- ☆12Updated 8 years ago
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆20Updated last year
- Perform basic NLP of popular subreddits to understand trending topics☆11Updated 10 years ago
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 9 years ago
- ☆168Updated 6 years ago
- There's Waldo contains a fully-convolution densenet approach to solving "Where's Waldo"☆75Updated 8 years ago
- p2p peer-to-peer training of tensorflow models☆62Updated 8 years ago
- Faceted search engine for domain-specific exploration of the Web☆45Updated 8 years ago
- Resume data and scripts for managing it☆91Updated 8 years ago
- A framework for BREACH and other compression-based crypto attacks☆235Updated 5 years ago
- Hunting cryptonote-related miners☆23Updated 5 years ago