DidierStevens / john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆24Updated 2 years ago
Alternatives and similar repositories for john:
Users that are interested in john are comparing it to the libraries listed below
- Forensic Imaging quickstarts!☆14Updated 2 years ago
- URL fingerprinting made easy☆86Updated 11 months ago
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 9 months ago
- A MITRE ATT&CK Lookup Tool☆45Updated 11 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- Hashes of infamous malware☆26Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆27Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆27Updated 3 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆21Updated 8 months ago
- Tools that trigger False Positive AV alerts☆44Updated 3 months ago
- A tool to use novel locations to extract metadata from Office documents.☆62Updated last year
- Bloodhound Portable for Windows☆51Updated 2 years ago
- ☆24Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- ☆12Updated 2 years ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆20Updated 2 months ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated 3 months ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated this week
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆27Updated last year
- ☆11Updated 4 years ago
- THOR APT Scanner User Manual☆18Updated last week
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆26Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year