-
Each one should be a different task.
-
Hi
Is there a way to know what of each of the rules do? Could you add some info on that on each rule file?
Thanks
-
[2.3](https://github.com/OWASP/ASVS/blob/master/5.0/en/0x11-V2-Authentication.md#v24-credential-storage)
OWASP Password storage cheat sheet recommends slow and salted algorithm which is quite good.…
leirn updated
1 month ago
-
**Describe the bug**
The bug occure when the dictionary is selected before the .pdf file
**To Reproduce**
Steps to reproduce the behavior:
1. Lunch main.py
2. Select dictionary
3. Select .pdf …
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### What happened?
They do not show correct values.
### How often does the bug occur?
Sometimes
### What versio…
-
Try and detect when the user is basing their password off a word (or multiple words) and then calculate brute force time based on that knowledge. Include common things like l33t spelling replacements,…
-
# Addressing the Risk of Dictionary Attacks on ONS
According to [List of data breaches](https://en.wikipedia.org/wiki/List_of_data_breaches) and [Biggest Data Breaches](https://www.upguard.com/blog…
-
-
**Is your feature request related to a problem? Please describe.**
When you do some attack, to load the keys file (whe you know, for testing for example) is very repetitive to do "-d xxx.dic" or "m…
ghiki updated
2 weeks ago
-
Hi, I've been playing with moonshot and I'm trying to figure out how to implement my own custom attack module using the provided sample template `sample_attack_module.py`.
In my case, I'm trying to…