openwall / johnLinks
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆12,652Updated 2 weeks ago
Alternatives and similar repositories for john
Users that are interested in john are comparing it to the libraries listed below
Sorting:
- World's fastest and most advanced password recovery utility☆25,294Updated 2 months ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆12,295Updated this week
- WiFi security auditing tools suite☆6,867Updated 6 months ago
- Nikto web server scanner☆10,026Updated this week
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,839Updated 3 years ago
- hydra☆11,624Updated 2 weeks ago
- Common User Passwords Profiler (CUPP)☆5,706Updated last month
- The Browser Exploitation Framework Project☆10,709Updated this week
- Small utilities that are useful in advanced password cracking☆1,539Updated 2 months ago
- NSE script based on Vulners.com API☆3,365Updated 4 months ago
- Web application fuzzer☆6,397Updated 2 weeks ago
- Advanced vulnerability scanning with Nmap NSE☆3,708Updated last year
- Web path scanner☆13,956Updated this week
- A little tool to play with Windows security☆21,224Updated 8 months ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,313Updated this week
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,843Updated 8 months ago
- Directory/File, DNS and VHost busting tool written in Go☆13,360Updated 3 weeks ago
- Next generation web scanner☆6,387Updated 3 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,411Updated last week
- Crack password hashes without the fuss☆1,376Updated 4 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,797Updated last month
- Attack Surface Management Platform☆9,361Updated 3 weeks ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,826Updated 5 years ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,481Updated this week
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,211Updated last year
- Automatic SQL injection and database takeover tool☆36,453Updated last week
- Open-Source Phishing Toolkit☆13,538Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool☆5,615Updated this week
- Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and sys…☆15,199Updated last week
- Exploitation Framework for Embedded Devices☆12,951Updated 7 months ago