JohnTheRipper
peda
JohnTheRipper | peda | |
---|---|---|
5 | 7 | |
4,811 | 5,750 | |
- | - | |
0.0 | 0.0 | |
about 3 years ago | 3 months ago | |
C | Python | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
JohnTheRipper
-
command zip2john not found help
git clone "https://github.com/magnumripper/JohnTheRipper.git" && cd JohnTheRipper/src && ./configure && sudo make -s clean && sudo make -sj4
-
PDF encryption/decryption
Use the pdf2john.pl command (part of the John the Ripper magnum pack) to create a hash for each pdf file.
-
Awesome CTF : Top Learning Resource Labs
John The Jumbo - Community enhanced version of John the Ripper.
-
Multidoge - Private Key Cannot be imported, can't decrypt.
To try this you need, time, the original python, (not python3, which wont work) Then you need to get the python script file named multibit2john.py
-
Password strength increase from repeating sequence?
John the Ripper Jumbo has rules to:
peda
- Emulating an emulator inside itself. Meet Blink
- Are there any cpu emulators that could help me learn i386 assembly?
-
GDB Verbose Output
Looks like they are using PEDA.
-
Hacked GDB Dashboard Puts It All on Display
There are a lot of these types of tools already in the reverse engineering community (in order of lowest chance of breaking when you throw really weird stuff at it):
GEF: https://gef.readthedocs.io/en/master/
PWNDBG: https://github.com/pwndbg/pwndbg
PEDA: https://github.com/longld/peda
They also come with a slew of different features to aid in RE/exploit dev, but many of them are also useful for debugging really weird issues.
-
Awesome CTF : Top Learning Resource Labs
PEDA - GDB plugin (only python2.7).
-
Awesome Penetration Testing
peda - Python Exploit Development Assistance for GDB.
-
GDB PEDA not being used by default?
Did you follow the instructions? Step 2 adds PEDA to your ~/.gdbinit so it will/should load every time you open gdb. So if it doesn't work check your ~/.gdbinit file.
What are some alternatives?
hashcat - World's fastest and most advanced password recovery utility
gef - GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
john - John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
pwndbg - Exploit Development and Reverse Engineering with GDB Made Easy
bitcracker - BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
pwntools - CTF framework and exploit development library
blake3 - An AVX-512 accelerated implementation of the BLAKE3 cryptographic hash function
dvcs-ripper - Rip web accessible (distributed) version control systems: SVN/GIT/HG...
42_CheatSheet - A comprehensive guide to 50 years of evolution of strict C programming, a tribute to Dennis Ritchie's language
objection - 📱 objection - runtime mobile exploration
lm8 - A custom 8-bit computer and software suite
Metasploit - Metasploit Framework