openwall / john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆11,232Updated this week
Alternatives and similar repositories for john:
Users that are interested in john are comparing it to the libraries listed below
- World's fastest and most advanced password recovery utility☆22,494Updated 8 months ago
- WiFi security auditing tools suite☆5,968Updated 4 months ago
- Nikto web server scanner☆9,194Updated 2 months ago
- hydra☆10,324Updated 3 weeks ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,245Updated this week
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,282Updated 7 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,658Updated 4 years ago
- Common User Passwords Profiler (CUPP)☆4,745Updated last year
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,677Updated last year
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10,967Updated this week
- ZMap is a fast single packet network scanner designed for Internet-wide network surveys.☆5,746Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,768Updated last month
- The pattern matching swiss knife☆8,721Updated 2 weeks ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,369Updated last year
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,774Updated 2 years ago
- The LAZY script will make your life easier, and of course faster.☆4,176Updated 3 years ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,063Updated 8 months ago
- WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websit…☆8,964Updated 2 weeks ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆6,882Updated last week
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆9,956Updated last year
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,534Updated 5 months ago
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with othe…☆3,564Updated last year
- A swiss army knife for pentesting networks☆8,694Updated last year
- Metasploit Framework☆35,397Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,540Updated last week
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆11,818Updated 6 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,086Updated last year
- Web application fuzzer☆6,149Updated 8 months ago
- Fluxion is a remake of linset by vk496 with enhanced functionality.☆5,213Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆9,781Updated this week