openwall / john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
☆10,849Updated this week
Alternatives and similar repositories for john:
Users that are interested in john are comparing it to the libraries listed below
- World's fastest and most advanced password recovery utility☆21,982Updated 6 months ago
- E-mails, subdomains and names Harvester - OSINT☆12,062Updated this week
- hydra☆10,088Updated this week
- Nikto web server scanner☆8,941Updated 3 weeks ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,600Updated 4 years ago
- Web application fuzzer☆6,059Updated 6 months ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10,648Updated this week
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,645Updated this week
- WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websit…☆8,819Updated this week
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆11,448Updated 4 months ago
- A little tool to play with Windows security☆19,800Updated 7 months ago
- Metasploit Framework☆34,855Updated this week
- Firmware Analysis Tool☆12,052Updated 2 weeks ago
- Fast subdomains enumeration tool for penetration testers☆10,127Updated 6 months ago
- Directory/File, DNS and VHost busting tool written in Go☆10,937Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆13,896Updated this week
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,394Updated last year
- The Browser Exploitation Framework Project☆10,055Updated this week
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆4,417Updated 3 months ago
- Next generation web scanner☆5,729Updated 7 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,732Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,663Updated 3 weeks ago
- A swiss army knife for pentesting networks☆8,587Updated last year
- Attack Surface Management Platform☆8,426Updated last month
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆5,930Updated 3 months ago
- In-depth attack surface mapping and asset discovery☆12,489Updated this week
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,500Updated 2 weeks ago
- w3af: web application attack and audit framework, the open source web vulnerability scanner.☆4,670Updated 2 years ago
- A DNS meta-query spider that enumerates DNS records, and subdomains.☆3,399Updated 3 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,082Updated 4 months ago