pmittaldev / john-the-ripperLinks
☆98Updated 12 years ago
Alternatives and similar repositories for john-the-ripper
Users that are interested in john-the-ripper are comparing it to the libraries listed below
Sorting:
- crunch wordlist generator from http://sourceforge.net/projects/crunch-wordlist/☆226Updated 6 years ago
- 密码生成 flexible and scriptable password dictionary generator which can support brute-force、combination、complex rule mode etc...☆164Updated 2 months ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆98Updated last year
- DMitry (Deepmagic Information Gathering Tool)☆225Updated last year
- Python script to crack hashes using online services☆89Updated 4 years ago
- coWPAtty: WPA2-PSK Cracking☆220Updated 6 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Updated 3 years ago
- Small set of tools to generate plainmasterkeys (rainbowtables) and hashes for the use with latest hashcat and John the Ripper.☆113Updated last year
- Linset is a WPA/WPA2 phishing tool (evil twin)☆142Updated last year
- archive of code from http://www.unicornscan.org/☆77Updated 13 years ago
- ☆81Updated 2 months ago
- dsniff is a collection of tools for network auditing and penetration testing.☆214Updated 15 years ago
- Source code for my crackstation.net website.☆156Updated 3 years ago
- Execute a brute force attack with Steghide to file with hide information and password established☆119Updated 4 years ago
- Maltego Penetration Testing Transforms☆375Updated 5 years ago
- A very flexible phone number wordlist generator☆69Updated last year
- Easy way to brute-force web directory.☆154Updated 6 years ago
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆226Updated 3 years ago
- Create awesome wordlist with python, demo: https://asciinema.org/a/101677☆123Updated 6 years ago
- A tool to harvest credentials from leaked data dump☆75Updated 3 years ago
- CrackStation.net's Lookup Table Implementation.☆390Updated 6 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆163Updated 7 years ago
- IP Cam Shell is a command line script for testing and exploiting a wide range of IP cameras as demonstrated by Craig Heffner in "Exploiti…☆142Updated 8 years ago
- Fetch, install and search exploit archives from exploit sites.☆116Updated last year
- Tool to identify routers on the local LAN and paths to the Internet☆209Updated last year
- A targeted password brute force tool☆131Updated 6 years ago
- TrueCrack is a brute-force password cracker for TrueCrypt (Copyrigth) volumes. It works on Linux and it is optimized for Nvidia Cuda tech…☆163Updated last year
- BlackArch Linux website☆133Updated 3 weeks ago
- Nikto for Windows with some extra features.☆182Updated 8 years ago
- netdiscover☆398Updated 2 years ago