John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆13,070Apr 28, 2026Updated last week
Alternatives and similar repositories for john
Users that are interested in john are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- World's fastest and most advanced password recovery utility☆25,920Feb 20, 2026Updated 2 months ago
- hydra☆11,762Updated this week
- Metasploit Framework☆38,066May 1, 2026Updated last week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,646Updated this week
- Directory/File, DNS and VHost busting tool written in Go☆13,677Apr 28, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆12,824May 1, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆15,691Updated this week
- A little tool to play with Windows security☆21,486Apr 17, 2026Updated 3 weeks ago
- WiFi security auditing tools suite☆7,185Jul 28, 2025Updated 9 months ago
- Automatic SQL injection and database takeover tool☆37,274May 2, 2026Updated last week
- Nikto web server scanner☆10,342Updated this week
- A swiss army knife for pentesting networks☆9,126Dec 6, 2023Updated 2 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,768May 1, 2026Updated last week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆77,442Apr 22, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Fast web fuzzer written in Go☆15,986Apr 26, 2026Updated last week
- Ghidra is a software reverse engineering (SRE) framework☆67,996Apr 30, 2026Updated last week
- UNIX-like reverse engineering framework and command-line toolset☆23,686Updated this week
- E-mails, subdomains and names Harvester - OSINT☆16,127May 2, 2026Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,442Jan 26, 2026Updated 3 months ago
- Web application fuzzer☆6,479Jan 21, 2026Updated 3 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,975Aug 17, 2020Updated 5 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,912Sep 6, 2023Updated 2 years ago
- Web path scanner☆14,238Apr 29, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The ultimate WinRM shell for hacking/pentesting☆5,370Mar 10, 2026Updated last month
- CTF framework and exploit development library☆13,412May 2, 2026Updated last week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,149Apr 18, 2026Updated 3 weeks ago
- Six Degrees of Domain Admin☆10,524Mar 2, 2026Updated 2 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,885Apr 25, 2024Updated 2 years ago
- In-depth attack surface mapping and asset discovery☆14,484Apr 17, 2026Updated 3 weeks ago
- The Browser Exploitation Framework Project☆10,832Apr 24, 2026Updated 2 weeks ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,835Jan 19, 2020Updated 6 years ago
- CeWL is a Custom Word List Generator☆2,661Apr 14, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,859Jun 15, 2020Updated 5 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,583Apr 23, 2026Updated 2 weeks ago
- Fast subdomains enumeration tool for penetration testers☆10,899Aug 2, 2024Updated last year
- Small utilities that are useful in advanced password cracking☆1,577Nov 8, 2025Updated 6 months ago
- WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websit…☆9,560Apr 30, 2026Updated last week
- Firmware Analysis Tool☆13,925Apr 14, 2026Updated 3 weeks ago
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆13,178Apr 20, 2026Updated 2 weeks ago