openwall / johnny
GUI frontend to John the Ripper password cracker
☆570Updated last year
Alternatives and similar repositories for johnny:
Users that are interested in johnny are comparing it to the libraries listed below
- Ncrack network authentication tool☆1,123Updated last year
- Small utilities that are useful in advanced password cracking☆1,431Updated 9 months ago
- MSFvenom Payload Creator (MSFPC)☆1,260Updated 3 years ago
- crunch wordlist generator from http://sourceforge.net/projects/crunch-wordlist/☆217Updated 6 years ago
- Automatically exported from code.google.com/p/ghost-phisher☆362Updated 4 years ago
- Medusa is a speedy, parallel, and modular, login brute-forcer.☆750Updated this week
- The New Hacking Framework☆700Updated 4 years ago
- Small tool to capture packets from wlan devices.☆1,949Updated this week
- High-Performance word generator with a per-position configureable charset☆450Updated 2 years ago
- A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.☆2,144Updated 2 weeks ago
- Websploit is a high level MITM framework☆1,186Updated last year
- coWPAtty: WPA2-PSK Cracking☆207Updated 6 years ago
- ☆548Updated last year
- The famous WPA precomputed cracker, Migrated from Google.☆1,094Updated 10 months ago
- Network Attack Tool☆1,468Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,310Updated 3 years ago
- Ruby on Rails Phishing Framework☆841Updated last year
- Undetectable Windows Payload Generation☆1,591Updated 2 years ago
- Advanced reconnaissance utility☆973Updated last year
- All releases of the security research group (a.k.a. hackers) The Hacker's Choice☆714Updated last year
- Automatically exported from code.google.com/p/armitage☆543Updated 3 years ago
- Some usefull scripts for KaliLinux☆464Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆741Updated 5 years ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆912Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,157Updated 5 years ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,503Updated last year
- An offline Wi-Fi Protected Setup brute-force utility☆1,611Updated 2 years ago
- Automatically brute force all services running on a target.☆2,066Updated 8 months ago
- ☆1,796Updated 4 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,409Updated 6 years ago