openwall / john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆10,638Updated 2 weeks ago
Alternatives and similar repositories for john:
Users that are interested in john are comparing it to the libraries listed below
- ☆7Updated last month
- World's fastest and most advanced password recovery utility☆21,758Updated 5 months ago
- A swiss army knife for pentesting networks☆8,542Updated last year
- Nikto web server scanner☆8,840Updated last week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,041Updated last week
- Firmware Analysis Tool☆11,850Updated last week
- Directory/File, DNS and VHost busting tool written in Go☆10,699Updated last week
- A little tool to play with Windows security☆19,696Updated 6 months ago
- Impacket is a collection of Python classes for working with network protocols.☆13,780Updated last week
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,474Updated this week
- E-mails, subdomains and names Harvester - OSINT☆11,802Updated this week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆13,507Updated last month
- hydra☆9,956Updated 5 months ago
- Attack Surface Management Platform☆8,313Updated 2 weeks ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,743Updated 2 years ago
- In-depth attack surface mapping and asset discovery☆12,322Updated 3 weeks ago
- Web path scanner☆12,423Updated 3 weeks ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10,479Updated this week
- CTF framework and exploit development library☆12,290Updated this week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆8,916Updated 8 months ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,062Updated last week
- Fast subdomains enumeration tool for penetration testers☆10,029Updated 5 months ago
- Small utilities that are useful in advanced password cracking☆1,394Updated 6 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,106Updated 2 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,514Updated 4 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,579Updated 4 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆8,767Updated last year
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,123Updated 2 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,592Updated 3 months ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,337Updated last year