openwall / johnLinks
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆11,769Updated 3 weeks ago
Alternatives and similar repositories for john
Users that are interested in john are comparing it to the libraries listed below
Sorting:
- World's fastest and most advanced password recovery utility☆23,977Updated last week
- Nikto web server scanner☆9,541Updated last month
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,164Updated 6 months ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆11,503Updated 2 weeks ago
- Metasploit Framework☆36,185Updated this week
- hydra☆10,738Updated 3 weeks ago
- WiFi security auditing tools suite☆6,319Updated 3 weeks ago
- Directory/File, DNS and VHost busting tool written in Go☆12,340Updated last week
- Common User Passwords Profiler (CUPP)☆4,921Updated last year
- Fast subdomains enumeration tool for penetration testers☆10,541Updated last year
- Web application fuzzer☆6,256Updated last year
- Web path scanner☆13,264Updated 2 months ago
- Exploitation Framework for Embedded Devices☆12,716Updated 2 months ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆24,754Updated 2 months ago
- Next generation web scanner☆6,008Updated 3 weeks ago
- Attack Surface Management Platform☆8,973Updated 2 months ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,812Updated 2 years ago
- Fast web fuzzer written in Go☆14,476Updated 4 months ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,769Updated 3 months ago
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,504Updated 8 months ago
- Ettercap Project☆2,562Updated last month
- CTF framework and exploit development library☆12,809Updated last week
- E-mails, subdomains and names Harvester - OSINT☆13,228Updated last week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13,620Updated 7 months ago
- WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websit…☆9,141Updated last week
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,214Updated last week
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆12,244Updated 10 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,736Updated 5 years ago
- Small utilities that are useful in advanced password cracking☆1,463Updated this week
- In-depth attack surface mapping and asset discovery☆13,437Updated 3 weeks ago