openwall / john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆10,279Updated this week
Related projects ⓘ
Alternatives and complementary repositories for john
- World's fastest and most advanced password recovery utility☆21,253Updated 2 months ago
- hydra☆9,720Updated 2 months ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10,179Updated this week
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,735Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆13,509Updated 2 weeks ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆4,755Updated 4 months ago
- CTF framework and exploit development library☆12,099Updated last week
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,573Updated 3 weeks ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆8,685Updated last year
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,292Updated 11 months ago
- Metasploit Framework☆34,132Updated this week
- A swiss army knife for pentesting networks☆8,438Updated 11 months ago
- WiFi security auditing tools suite☆5,428Updated 2 months ago
- An advanced memory forensics framework☆7,315Updated last year
- Open-Source Phishing Toolkit☆11,599Updated last month
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,445Updated 7 months ago
- Web application fuzzer☆5,954Updated 2 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆58,351Updated this week
- Next generation web scanner☆5,542Updated 3 months ago
- Rewrite of the popular wireless network auditor, "wifite"☆6,427Updated 2 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,452Updated last month
- Attack Surface Management Platform☆8,077Updated 2 weeks ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,517Updated 4 years ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,591Updated this week
- Small utilities that are useful in advanced password cracking☆1,359Updated 4 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆6,945Updated last month
- Directory/File, DNS and VHost busting tool written in Go☆10,054Updated last week
- Empire is a PowerShell and Python post-exploitation agent.☆7,444Updated 4 years ago
- Common User Passwords Profiler (CUPP)☆4,487Updated 11 months ago
- Fast subdomains enumeration tool for penetration testers☆9,856Updated 3 months ago