DidierStevens / johnLinks
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆24Updated 3 years ago
Alternatives and similar repositories for john
Users that are interested in john are comparing it to the libraries listed below
Sorting:
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 8 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 6 months ago
- Hashes of infamous malware☆26Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- Recordization library☆9Updated last week
- Collection of videos of Raids on Cybercriminals☆19Updated 3 months ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 5 months ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆27Updated 3 years ago
- ☆28Updated 5 months ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆27Updated 2 years ago
- Forensic Imaging quickstarts!☆14Updated 2 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated 2 years ago
- Tools that trigger False Positive AV alerts☆50Updated 6 months ago
- URL fingerprinting made easy☆86Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- This free tool parses Google Takeout Location History Exports or Google Semantic Location History Warrant Return Data in a forensic manne…☆33Updated last month
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- ☆19Updated 2 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆66Updated last year
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- ☆17Updated 3 years ago