See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.
☆18Aug 31, 2018Updated 7 years ago
Alternatives and similar repositories for fvde2john
Users that are interested in fvde2john are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated 2 years ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆16Aug 8, 2019Updated 6 years ago
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- Remote agent used for processing distributed jobs☆15Dec 15, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Extract APFS hashes☆41Jun 16, 2020Updated 5 years ago
- Tool to archive RPM packages and attest to their authenticity☆14Jun 5, 2025Updated 10 months ago
- 🗺 Convert nmap XML output to beautiful JSON☆16Mar 17, 2023Updated 3 years ago
- A very very fast VHDL implementation of the WPA2 encryption algorithm.☆26Jul 15, 2017Updated 8 years ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago
- A diverse collection of useful (to me!) software written in C. Memory profiling, http server, editor, crash reporter, clang plugin, torre…☆23Feb 28, 2025Updated last year
- Python code for doing k-Best or List decoding with the Viterbi algorithm☆18May 4, 2017Updated 9 years ago
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Oct 5, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Universal BIOS Recovery console for x86 PCs☆47May 10, 2024Updated last year
- ☆22Dec 22, 2020Updated 5 years ago
- Resistance Miner☆14Feb 4, 2020Updated 6 years ago
- VeraCrypt container cracker using hashcat and wordlist/dictionary☆22May 29, 2020Updated 5 years ago
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆44Mar 15, 2026Updated last month
- ☆16Aug 19, 2021Updated 4 years ago
- Patches Kernel DMA Protection onto unsupported Thunderbolt-powered systems.☆30Sep 14, 2020Updated 5 years ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s …☆24Jun 26, 2022Updated 3 years ago
- ☆20Nov 16, 2024Updated last year
- Reversing Samsung SecretZone. Decrypt MSR files without any password! All thanks to Francesco Picasso.☆22Feb 13, 2026Updated 2 months ago
- ☆24Apr 1, 2026Updated last month
- Check IP addresses against known cloud provider IP address ranges☆48Feb 7, 2026Updated 2 months ago
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Dec 26, 2024Updated last year
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- ☆33Apr 23, 2023Updated 3 years ago
- A clean & simple implementation of BLAKE2b and BLAKE2s hash functions -- written while writing the RFC.☆20Nov 3, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Sep 29, 2025Updated 7 months ago
- Infer internal state of Mersenne Twister from truncated output☆77Jul 28, 2022Updated 3 years ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- A proof of concept program that pulls and parses security.txt files at mass.☆29May 31, 2023Updated 2 years ago
- The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The…☆27Jul 21, 2023Updated 2 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Dec 25, 2015Updated 10 years ago
- Rust bindings to Microsoft Windows users / groups management API☆35Dec 27, 2025Updated 4 months ago