Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems. Learn more →
John Alternatives
Similar projects and alternatives to john
-
-
CodeRabbit
CodeRabbit: AI Code Reviews for Developers. Revolutionize your code reviews with AI. CodeRabbit offers PR summaries, code walkthroughs, 1-click suggestions, and AST-based analysis. Boost productivity and code quality across all major languages with each PR.
-
CyberChef
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
-
mitmproxy
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
-
-
-
pdfarranger
Small python-gtk application, which helps the user to merge or split PDF documents and rotate, crop and rearrange their pages using an interactive and intuitive graphical interface.
-
InfluxDB
InfluxDB high-performance time series database. Collect, organize, and act on massive volumes of high-resolution data to power real-time intelligent systems.
-
-
-
btcrecover
An open source Bitcoin wallet password and seed recovery tool designed for the case where you already know most of your password/seed, but need assistance in trying different possible combinations.
-
Kaitai Struct
Kaitai Struct: declarative language to generate binary data parsers in C++ / C# / Go / Java / JavaScript / Lua / Nim / Perl / PHP / Python / Ruby
-
-
-
-
Wireshark
Read-only mirror of Wireshark's Git repository at https://gitlab.com/wireshark/wireshark. ⚠️ GitHub won't let us disable pull requests. ⚠️ THEY WILL BE IGNORED HERE ⚠️ Upload them at GitLab instead.
-
-
-
-
btcrecover
BTCRecover is an open source wallet password and seed recovery tool. For seed based recovery, this is primarily useful in situations where you have lost/forgotten parts of your mnemonic, or have made an error transcribing it. (So you are either seeing an empty wallet or gettign an error that your seed is invalid) For wallet password or passphrase recovery, it is primarily useful if you have a reasonable idea about what your password might be. (by 3rdIteration)
-
bruteforce-wallet
Try to find the password of an encrypted Peercoin (or Bitcoin, Litecoin, etc...) wallet file.
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
john discussion
john reviews and mentions
-
It Started as Fun, Turned Into a Calling...
My quest to crack this Wi-Fi password led me deep into the world of network security. I learned about tools like aircrack-ng and John the Ripper. I discovered the concept of packet capture and the vulnerabilities of WPS-protected networks. But more importantly, this journey led me to a revelation that would change everything: Android was built on the Linux kernel.
-
Best Hacking Tools for Beginners 2024
John The Ripper
-
Wordlists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.
🔗Kali Linux Wordlist: What you need to know 🔗crunch 🔗WordLists - Kali-Tools 🔗WordLists - GitLab - repository 🔗John - Kali-Tools . 🔗Openwall -github repository -John 🔗John-The-Ripper-Tutorial - Techy Rick 🔗Openwall -John - Offical Website . 🔗Hash Cat - Wiki 🔗Cap 2 Hashcat 🔗Markov - Chain 🔗Hash Cat - Forums 🔗Security Stack Exchange - Question 260773 🔗StationX - How to use Hashcat 🔗MSF/Wordlists - charlesreid 🔗MSFConsole 🔗How to use hashcat 🔗MSF/Wordlists - charlesreid1 🔗Where do the words in /usr/share/dict/words come from? 🔗SCOWL (Spell Checker Oriented Word Lists) 🔗The spell utility -spell - find spelling errors (LEGACY) - UNIX What are Different Types of Cryptography? sha1-vs-sha2-the-technical-difference-explained-by-ssl-experts/ 🔗password-encryption 🔗Secure-Programs SHA-1 🔗What-are-computer-algorithms 🔗What Are MD5, SHA-1, and SHA-256 Hashes, and How Do I Check Them? - howtogeek.com 🔗kali-linux-wordlist-what-you-need-to-know
-
password decryption help
Ok, both John the ripper, hashcat and other tools seem to support extracting the hash, or directly trying to discover the password.
- Metasploit explained for pentesters
-
Inception: Leaking the root hash from /etc./shadow on AMD Zen 4 [video]
With the root hash you can crack the root password using tools like John The Ripper[0]. More generally, I assume, this exploit can be used to read any arbitrary files on the system, bypassing regular access control, and plenty of other stuff you aren't supposed to be able to do as a non-privileged user.
0: https://www.openwall.com/john/
-
How to pass this captcha?
use (John the Ripper)[https://github.com/openwall/john] and (rockyou.txt)[https://github.com/rockyou.txt]
-
Attempting to use john the ripper on a password protected zip file, says it is not encrypted?
this actually seems to have been reported as a bug and fixed years ago but it is still affecting me on a version freshly downloaded from the AUR, is there a way around this or another program i can use?
-
Hackers Tools: Must-Have Tools for Every Ethical Hacker
John the Ripper
-
Password-protecting PDF pay statements with Social Insurance Number (Canada).
Since I used to work for the employer in question, I decide to crack my own password-protected pay statements. I downloaded and built John the Ripper jumbo and then all I had to do was run a few commands after looking at the documentation, and there was my SIN number almost instantly.
-
A note from our sponsor - InfluxDB
influxdata.com | 18 Apr 2025
Stats
openwall/john is an open source project licensed under GNU General Public License v3.0 or later which is an OSI approved license.
The primary programming language of john is C.