Training and testing of linguistic passwords models.
☆27Aug 20, 2024Updated last year
Alternatives and similar repositories for semantic-guesser
Users that are interested in semantic-guesser are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries☆21May 7, 2024Updated last year
- Password attack and defense using deep neural networks☆24Aug 3, 2022Updated 3 years ago
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- A Deep Learning Approach for Password Guessing☆24Jun 1, 2023Updated 2 years ago
- Monte Carlo password checking☆11Aug 14, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Probabilistic Context Free Grammar (PCFG) password guess generator☆366Sep 2, 2025Updated 6 months ago
- A framework for password-strength evaluation☆14Sep 26, 2020Updated 5 years ago
- Web安全技术课程大作业. 实现基于CNN和RNN的对抗生产网络模型(GANs), 尽可能多地猜测口令, 以攻破目标的口令。A password cracking model based on GAN, with RNN as its discriminator and g…☆30Nov 13, 2020Updated 5 years ago
- RNN-LSTM that learns passwords from a starting list☆38Apr 13, 2017Updated 8 years ago
- Use machine learning to classify malware. Malware analysis 101. Set up a cybersecurity lab environment. Learn how to tackle data class im…☆17Jul 15, 2020Updated 5 years ago
- ☆32Nov 22, 2021Updated 4 years ago
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated last month
- The code and dataset for the paper HOLMES & WATSON: A Robust and Lightweight HTTPS Website Fingerprinting through HTTP Version Parallelis…☆13May 30, 2025Updated 9 months ago
- ☆16Jan 5, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Iterative training on pseudo-labeled data experiment on the MNIST-dataset☆11Sep 3, 2024Updated last year
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆14Oct 28, 2025Updated 4 months ago
- The comparison of the performance of different machine learning methods for computer security problems☆10May 19, 2024Updated last year
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- Password Similarity Detection Using Deep Neural Networks. This project was the case study of my bachelor's thesis.☆23Apr 8, 2021Updated 4 years ago
- Code for cracking passwords with neural networks☆242Dec 2, 2019Updated 6 years ago
- wifiDOS with scapy☆16May 4, 2016Updated 9 years ago
- Implementation of seq2seq word-level model using keras☆12Dec 18, 2017Updated 8 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Network related services, programs and applications are developing greatly, however, network security breaches are also developing with t…☆27Jul 29, 2021Updated 4 years ago
- Securing LLM's Against Top 10 OWASP Large Language Model Vulnerabilities 2024☆22May 10, 2024Updated last year
- Security Analytics UoM - COMP90073 - S2 2020☆10Oct 1, 2021Updated 4 years ago
- Inspired by the neural style algorithm in the computer vision field, we propose a high-level language model with the aim of adapting the …☆18Nov 20, 2022Updated 3 years ago
- ☆12Aug 8, 2019Updated 6 years ago
- Adversarial machine learning and explainable machine learning for cyber security☆13Jun 21, 2022Updated 3 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆33Dec 3, 2022Updated 3 years ago
- ☆21Sep 8, 2025Updated 6 months ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Autonomous Security Analysis and Penetration Testing☆25Dec 8, 2022Updated 3 years ago
- TensorFlow implementation of "A Hybrid Convolutional Variational Autoencoder for Text Generation"☆17Sep 16, 2019Updated 6 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- ☆17Aug 25, 2017Updated 8 years ago