CometOS is a ubuntu based distro with the kde plasma desktop, pre installed with a couple of kali tools (wireshark, john the ripper, sqlmap, and nmap). also preinstalled with Steam, GIMP, LibreOffice, Gparted, and custom bootloader themes.
...Offline password decrypting on WPA/WPA2 captured files for personal networks (Handshakes and PMKIDs) using a dictionary, brute-force, and rule-based attacks with aircrack, crunch and hashcat tools. Enterprise networks captured password decrypting based on john the ripper, crunch, asleap and hashcat tools. GPU support available for hashcat. Only Rogue/Fake AP mode to sniff using external sniffer (Hostapd + DHCP + DoS).
Jono-NG adalah script Bash open-source yang dirancang untuk mempermudah penggunaan John the Ripper (JtR) dalam cracking kata sandi file terenkripsi seperti ZIP, RAR, 7z, PDF, dan dokumen Microsoft Office (.docx, .xlsx, .pptx).
...The following are supported-
-->MD4
-->MD5
-->SHA1
-->SHA224
-->SHA256
-->SHA384
-->SHA512
-->RIPEMD160
There will be more algorithm support to come. There is also a utility to create these supported hashes and another utility to encode and deocde strings with Base64. Includes password.lst from John The Ripper.
[INFO]Darkscan determines hash type only by looking at the digit length of a hash. This script is still kind of experimental, and there will be more things to come out of it.
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Complete your wireless pentesting sessions with dlive airo, the quickest way to crack a wireless network.
Dlive Airo comes with the complete aircrack-ng suite, its dependencies and all airoscript-ng plugins.
thad0ctor's BT5 toolkit streamlines word list creation and other tasks
Originally designed as a word list creation tool, thad0ctor's BT5 Toolkit has become an all purpose security script to help simplify many Backtrack 5 functions to help Pentesters strengthen their systems.
The backbone of thad0ctor's Backtrack 5 Toolkit is the Wordlist Toolkit that contains a plethora of tools to create, modify, and manipulate word lists in order for end users to strengthen their systems by testing their passwords against a variety of tools designed to expose their pass...
WORDFIELD is an extremely fast incremental word list generator. It's meant for use with a password recovery tool such as John the Ripper or aircrack-ng.
Originally made to crack /etc/passwd files from *nix utilizing the GPU. Uses GLSL and OpenGL. Acts as a parallel to John the Ripper, but for the GPU. Supports both ATI and nVidia, anywhere OpenGL can run.
Distributed John is a distributed password cracking using John The Ripper. It consists of a server that handles work to the clients (each on a different machine), which use John the Ripper.
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
The Password Auditing Project will be a compilation of other, previously released password auditing programs, in such a fashion as to reap the best benefits of each portion. Pulling innovations from John the Ripper, Lepton, Rainbow Tables, and more.