DidierStevens / john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆23Updated 2 years ago
Alternatives and similar repositories for john:
Users that are interested in john are comparing it to the libraries listed below
- Hashes of infamous malware☆25Updated last year
- A MITRE ATT&CK Lookup Tool☆45Updated 8 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆53Updated 7 months ago
- ☆33Updated 3 years ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Updated 2 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated last month
- URL fingerprinting made easy☆82Updated 9 months ago
- Tools that trigger False Positive AV alerts☆44Updated 3 weeks ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆64Updated last year
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- Forensic Imaging quickstarts!☆13Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆25Updated last year
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- Fork this repo! Do a Pull Request! As many times as you want! Learn the ins and outs of how to contribute to GitHub! Make your mistakes h…☆12Updated 6 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 2 months ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- A tool to use novel locations to extract metadata from Office documents.☆61Updated last year
- Ransomware groups posts☆35Updated this week
- A quick reference guide for python script development in DFIR☆16Updated 9 months ago
- Collection of videos of Raids on Cybercriminals☆18Updated 3 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆75Updated 2 months ago
- Automating VirusTotal's API v3 for IP address and URL analysis w/HTML Reporting. Python script that functions like a CLI tool to interac…☆42Updated 2 years ago