A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools
☆43Mar 15, 2026Updated this week
Alternatives and similar repositories for john-samples
Users that are interested in john-samples are comparing it to the libraries listed below
Sorting:
- Test Suite for John the Ripper☆25Dec 28, 2025Updated 2 months ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 3 weeks ago
- Proof-of-work scheme building upon yescrypt and scrypt☆35Jun 15, 2025Updated 9 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated 2 years ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- Implementation of bcrypt password hashing scheme☆12Jan 11, 2021Updated 5 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆18Aug 31, 2018Updated 7 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- cross platform GUI for k2pdfopt, built with electron☆17Apr 3, 2017Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated last month
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- A very very fast VHDL implementation of the WPA2 encryption algorithm.☆26Jul 15, 2017Updated 8 years ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 4 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- A diverse collection of useful (to me!) software written in C. Memory profiling, http server, editor, crash reporter, clang plugin, torre…☆23Feb 28, 2025Updated last year
- Safe Qubes OS screenshot tool with active VM detection & window border removal features☆15Nov 28, 2024Updated last year
- Simple PoC for a bootkit written as a UEFI Option ROM Driver☆11Oct 5, 2022Updated 3 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 9 months ago
- Copy of the libewf source code that is configured for a 64-bit MS Visual Studio build.☆17Aug 17, 2020Updated 5 years ago
- TCP port scan detection tool☆69May 28, 2022Updated 3 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- A python script to shift the timestamp on syslog data. Useful for forensicators combating time skew.☆21May 19, 2022Updated 3 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Dec 25, 2015Updated 10 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Sep 14, 2023Updated 2 years ago
- ☆37Sep 29, 2020Updated 5 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Looks up command line syntax from cheatsheets using fuzzy search☆16Feb 20, 2026Updated last month