DidierStevens / johnLinks
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆24Updated 3 years ago
Alternatives and similar repositories for john
Users that are interested in john are comparing it to the libraries listed below
Sorting:
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- ☆29Updated 6 months ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- URL fingerprinting made easy☆87Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆27Updated 2 years ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- A tool to use novel locations to extract metadata from Office documents.☆63Updated 2 years ago
- THOR APT Scanner User Manual☆18Updated this week
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 9 months ago
- DriveFS Sleuth is a Python tool that automates investigating Google Drive File Stream disk artifacts, the tool has been developed based o…☆82Updated 7 months ago
- Hashes of infamous malware☆26Updated 2 years ago
- A forensic open-source parser module for Autopsy that allows extracting the messages, comments, posts, contacts, calendar entries and rea…☆96Updated last year
- ☆46Updated 2 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- A realistic simulator of Active Directory domains☆40Updated 3 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 3 months ago
- Gmail URL Decoder is an Open Source Python tool that can be used against plaintext or arbitrary raw data files in order to find, extract,…☆57Updated 5 years ago
- Jupyter Notebooks for the Blue Team☆36Updated 6 months ago
- AIL project training materials☆34Updated 2 weeks ago
- Papers, presentations and documents from the team at Hacker House.☆51Updated 5 years ago
- Resources, tools and utilities about Threat Intelligence☆68Updated 2 years ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆28Updated 3 years ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆83Updated last month
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆99Updated last year
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆68Updated last month
- ☆19Updated 2 years ago