openwall / john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆11,105Updated this week
Alternatives and similar repositories for john:
Users that are interested in john are comparing it to the libraries listed below
- World's fastest and most advanced password recovery utility☆22,303Updated 7 months ago
- Web application fuzzer☆6,120Updated 7 months ago
- WiFi security auditing tools suite☆5,893Updated 3 months ago
- Web path scanner☆12,702Updated last month
- Small utilities that are useful in advanced password cracking☆1,417Updated 8 months ago
- The Browser Exploitation Framework Project☆10,124Updated this week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆61,663Updated this week
- Attack Surface Management Platform☆8,592Updated last month
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10,845Updated last week
- E-mails, subdomains and names Harvester - OSINT☆12,309Updated this week
- In-depth attack surface mapping and asset discovery☆12,694Updated this week
- Fast web fuzzer written in Go☆13,652Updated 9 months ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆8,865Updated last year
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,135Updated 6 months ago
- Fast subdomains enumeration tool for penetration testers☆10,228Updated 7 months ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,031Updated 7 months ago
- Impacket is a collection of Python classes for working with network protocols.☆14,080Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,421Updated this week
- Next generation web scanner☆5,786Updated 8 months ago
- Directory/File, DNS and VHost busting tool written in Go☆11,239Updated last week
- Empire is a PowerShell and Python post-exploitation agent.☆7,573Updated 5 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,728Updated 2 weeks ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,638Updated last year
- Fast passive subdomain enumeration tool.☆11,409Updated this week
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,203Updated last week
- NSE script based on Vulners.com API☆3,288Updated 11 months ago
- A little tool to play with Windows security☆19,947Updated 8 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,627Updated 4 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,245Updated 6 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆9,864Updated last year