advanced code generator for John the Ripper
☆13May 6, 2018Updated 7 years ago
Alternatives and similar repositories for john-devkit
Users that are interested in john-devkit are comparing it to the libraries listed below
Sorting:
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated last year
- A very very fast VHDL implementation of the WPA2 encryption algorithm.☆26Jul 15, 2017Updated 8 years ago
- A tiny tool to learn the assembly code☆12Feb 17, 2017Updated 9 years ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- Convert an IOS/NXOS/ACE/ASA config file into basic HTML, creating links between commands referencing lists and that list (e.g. access lis…☆14May 23, 2018Updated 7 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 5 months ago
- Open source library to handle integers of any size in C☆14Apr 11, 2023Updated 2 years ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- An example showing how to develop basic firmware for the Pico Debug'n'Dump☆15May 26, 2023Updated 2 years ago
- Test Suite for John the Ripper☆25Dec 28, 2025Updated 2 months ago
- PyOpenCL ZCash miner☆15Sep 21, 2016Updated 9 years ago
- Template for a Python application installer☆18Mar 29, 2014Updated 11 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆17Aug 31, 2018Updated 7 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Aug 10, 2016Updated 9 years ago
- Information on EGG compression file format and UnEgg decompression module.☆18May 25, 2017Updated 8 years ago
- Resistance Miner☆14Feb 4, 2020Updated 6 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆16Jul 13, 2015Updated 10 years ago
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- Prototype private key hashing agent☆16Jan 8, 2018Updated 8 years ago
- simplecoin pushpool frontend☆40Sep 21, 2011Updated 14 years ago
- Reversing Samsung SecretZone. Decrypt MSR files without any password! All thanks to Francesco Picasso. Only commercial (paid) support is …☆22Feb 13, 2026Updated 2 weeks ago
- driver library for Ti CC1100 / CC1101. For Arduino and Raspberry Pi☆23Nov 28, 2017Updated 8 years ago
- Python code for doing k-Best or List decoding with the Viterbi algorithm☆18May 4, 2017Updated 8 years ago
- A fork of Picoprobe, an SWD progammer firmware, for the Pico Debug'n'Dump☆21Aug 24, 2021Updated 4 years ago
- A diverse collection of useful (to me!) software written in C. Memory profiling, http server, editor, crash reporter, clang plugin, torre…☆23Feb 28, 2025Updated last year
- Notes on QEMU and Debian MIPS (big-endian)☆45Nov 12, 2018Updated 7 years ago
- ☆24Sep 12, 2024Updated last year
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆18Jan 17, 2026Updated last month
- MS-CHAP-V2 SHOULD NOT be used...☆20Feb 27, 2022Updated 4 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Enigma in FPGA☆29May 18, 2019Updated 6 years ago
- Implementation of the Progress OpenEdge ENCODE algorithm☆28Aug 9, 2017Updated 8 years ago
- AYCWABTU is a brute force control word calculation tool for the DVB common scrambling algorithm (csa) that finds keys in encrypted transp…☆27Apr 10, 2023Updated 2 years ago
- usand - convenient and minimal unshare(1)-based sandbox☆67Nov 28, 2020Updated 5 years ago
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago