DidierStevens / johnLinks
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆24Updated 3 years ago
Alternatives and similar repositories for john
Users that are interested in john are comparing it to the libraries listed below
Sorting:
- Passive OS detection based on SYN packets without Transmitting any Data☆48Updated 2 years ago
- Forensic Imaging quickstarts!☆13Updated 3 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 3 years ago
- High signal information security sources Goggle.☆67Updated 2 years ago
- URL fingerprinting made easy☆90Updated last year
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated this week
- MatterBot is a two-part extensible Python bot framework that provides a scheduled feed of information sources to your Mattermost channel(…☆37Updated this week
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 4 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- ☆20Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆56Updated 4 years ago
- ☆27Updated 5 months ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- THOR APT Scanner User Manual☆20Updated this week
- ☆18Updated 4 years ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆29Updated 4 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Updated 3 years ago
- Resources, tools and utilities about Threat Intelligence☆78Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated last month
- Jupyter Notebooks for the Blue Team☆39Updated last year
- A web front-end for password cracking and analytics☆16Updated 7 years ago
- Evtx Log (xml) Browser☆57Updated 2 years ago
- ☆47Updated last month
- ☆37Updated 4 years ago
- ☆12Updated 3 years ago
- Various components we use in labs☆10Updated 5 years ago
- A WikiLeaks scraper inspired by the Datasploit module previously written in Python2. This script leverages pandas and Python3.☆38Updated last year