magnumripper / john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆17Updated this week
Alternatives and similar repositories for john:
Users that are interested in john are comparing it to the libraries listed below
- advanced code generator for John the Ripper☆12Updated 6 years ago
- Solution for capturing wlan traffic and conversion to hashcat formats (recommended by hashcat). Support for hashcat hash-modes (2500, 250…☆8Updated 4 years ago
- ☆20Updated last year
- Zyxel VMG8823-B50B WPA Keygen☆8Updated 2 years ago
- ST25TB / SRx NFC Emulator / Initiator - kameleon - based on TI TRF7970A with MSP430☆12Updated 6 months ago
- Our fork of Iceman's fork for Proxmark III☆15Updated 2 months ago
- ☆16Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Realtek RTL8814AU USB Wi-Fi driver☆8Updated 7 years ago
- Small tool to capture packets from Bluetooth devices.☆47Updated last year
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- ARP Man-in-the-Middle tool☆28Updated 2 months ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Updated 12 years ago
- Session scripts.☆43Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- Diebold Accuvote-TSx Election Machine Hacking☆39Updated 4 years ago
- Refluxion -- MITM WPA attacks tool☆34Updated 4 years ago
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- A set of scripts for managing an Ethernet Person-in-the-Middle device, a la Duckwall "A Bridge Too Far"☆16Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Driver Attack Platform for Linux☆18Updated last year
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆14Updated last year
- Creates a series of empty folders named after default keyspaces.☆12Updated 9 years ago
- Sniffs sensitive data from interface or pcap☆14Updated 9 years ago
- Project Gutenberg Australia word lists☆13Updated 3 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year