openwall / johnLinks
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆12,527Updated last week
Alternatives and similar repositories for john
Users that are interested in john are comparing it to the libraries listed below
Sorting:
- World's fastest and most advanced password recovery utility☆25,138Updated last month
- hydra☆11,516Updated last week
- Nikto web server scanner☆9,972Updated 3 weeks ago
- Small utilities that are useful in advanced password cracking☆1,532Updated 2 months ago
- Fast subdomains enumeration tool for penetration testers☆10,764Updated last year
- Common User Passwords Profiler (CUPP)☆5,451Updated 3 weeks ago
- Web application fuzzer☆6,379Updated last year
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆12,167Updated this week
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,833Updated 3 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,833Updated 7 months ago
- A little tool to play with Windows security☆21,169Updated 8 months ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,302Updated this week
- Ettercap Project☆2,653Updated this week
- Next generation web scanner☆6,349Updated 2 months ago
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,578Updated last year
- Rewrite of the popular wireless network auditor, "wifite"☆7,523Updated last year
- WiFi security auditing tools suite☆6,781Updated 5 months ago
- Small tool to capture packets from wlan devices.☆2,067Updated this week
- Veil 3.1.X (Check version info in Veil at runtime)☆4,187Updated 2 years ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,204Updated last year
- w3af: web application attack and audit framework, the open source web vulnerability scanner.☆4,842Updated 2 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,714Updated 2 weeks ago
- Software to identify the different types of hashes -☆1,441Updated 3 years ago
- The pattern matching swiss knife☆9,336Updated last month
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,487Updated 4 years ago
- Fast web fuzzer written in Go☆15,416Updated 8 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,762Updated 5 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,812Updated 5 years ago
- Attack Surface Management Platform☆9,339Updated this week
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,351Updated last year