Test Suite for John the Ripper
☆26Dec 28, 2025Updated 4 months ago
Alternatives and similar repositories for john-tests
Users that are interested in john-tests are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Sniffs sensitive data from interface or pcap☆17Mar 10, 2015Updated 11 years ago
- hashkill password recovery tool☆12Feb 4, 2014Updated 12 years ago
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆44Mar 15, 2026Updated last month
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Implementation of bcrypt password hashing scheme☆12Jan 11, 2021Updated 5 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆18Aug 31, 2018Updated 7 years ago
- Password/passphrase strength checking and policy enforcement☆48Mar 21, 2026Updated last month
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 2 months ago
- ☆24Sep 12, 2024Updated last year
- ☆11Feb 9, 2023Updated 3 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Lots of Apktool bugs require me to create test apks as unit-tests. I will start storing the source of those applications here.☆11Mar 21, 2024Updated 2 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- It's an RSA-cracker, that uses Fermat's factorization method to get p and q.☆15Dec 19, 2015Updated 10 years ago
- Resistance Core☆10Feb 15, 2021Updated 5 years ago
- ETHICAL-HACKING☆13Dec 20, 2023Updated 2 years ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆15Nov 22, 2024Updated last year
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- TCP port scan detection tool☆70May 28, 2022Updated 3 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated last year
- The scripts and configuration that run XMPP.is☆15Jan 2, 2026Updated 3 months ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- ☆17Mar 25, 2019Updated 7 years ago
- CSV Manager for AWS Security Hub exports SecurityHub findings to a CSV file and allows you to mass-update SecurityHub findings by modifyi…☆17Jul 23, 2025Updated 9 months ago
- Public Repo for Phoenix CMS☆13Jan 12, 2017Updated 9 years ago
- Convenient Password Hashing Library in Go☆25Apr 20, 2026Updated last week
- Short deep dive into Threat Hunting on AWS☆19Oct 15, 2023Updated 2 years ago
- ☆19Apr 16, 2026Updated 2 weeks ago