magnumripper / john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆18Updated this week
Alternatives and similar repositories for john:
Users that are interested in john are comparing it to the libraries listed below
- Solution for capturing wlan traffic and conversion to hashcat formats (recommended by hashcat). Support for hashcat hash-modes (2500, 250…☆9Updated 5 years ago
- Small tool to capture packets from Bluetooth devices.☆47Updated last year
- ARP Man-in-the-Middle tool☆29Updated 3 months ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 3 months ago
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- advanced code generator for John the Ripper☆12Updated 6 years ago
- A set of scripts for managing an Ethernet Person-in-the-Middle device, a la Duckwall "A Bridge Too Far"☆16Updated 3 years ago
- Force target victim to unsafe network☆19Updated this week
- SimBrush - SIM data carver and wrapper☆20Updated 13 years ago
- World's fastest and most advanced GPGPU-based password recovery utility☆19Updated 2 weeks ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Updated 12 years ago
- hashkill password recovery tool☆11Updated 11 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆10Updated last month
- Tools for attacking various MIFARE RFID cards☆15Updated 5 years ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆21Updated 3 years ago
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- Sniffs sensitive data from interface or pcap☆15Updated 10 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 7 years ago
- Get clients and access points.☆49Updated 5 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆11Updated last month
- Tools for optimizing and handling the SSID pool for the WiFi Pineapple Mark VII.☆20Updated 2 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.☆31Updated 3 years ago
- An RF stack for building exfiltration systems.☆16Updated 6 years ago
- LLM based autonomous agent that does online comprehensive research on any given topic☆9Updated 6 months ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Digispark 6-Digit PIN Brute Force attack for USB-OTG Android devices☆14Updated 4 months ago
- Mobile phone PWN tools and scripts☆14Updated 4 years ago