An advanced offline password cracker supporting hundreds of hash and cipher types across multiple platforms.
John the Ripper is an advanced offline password cracker used to detect weak passwords by cracking password hashes. It supports hundreds of hash and cipher types and runs on various operating systems and hardware including CPUs, GPUs, and FPGAs. It is primarily used for security auditing, penetration testing, and digital forensics to evaluate password strength.
Security professionals, penetration testers, digital forensics experts, and system administrators who need to audit password security and identify authentication vulnerabilities.
Developers choose John the Ripper for its extensive hash support, multi-platform compatibility, and flexibility with multiple cracking modes. Its open-source nature and active community contributions make it a versatile and powerful tool for security testing.
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Supports hundreds of hash types including Unix crypt, Windows NTLM, and SHA-crypt, with autodetection for many, as listed in the README's extensive hash/cipher support section.
Runs on multiple OSes and leverages CPUs, GPUs, and FPGAs for accelerated cracking, ensuring broad hardware utilization across Unix, macOS, and Windows.
Offers wordlist, rule-based, incremental, and custom modes with a built-in compiler, allowing tailored attack strategies as described in the MODES documentation.
Allows sessions to be interrupted and resumed with automatic state saving, facilitating long-running cracks without data loss, highlighted in the basic usage examples.
Requires compilation from source or careful binary selection, with extensive configuration files needed for optimal use, as detailed in the INSTALL and CONFIG docs, making initial setup time-consuming.
The community-enhanced jumbo version includes immature code with expected bugs, as explicitly warned in the README, which can lead to unreliability in critical auditing scenarios.
Command-line driven with numerous options and modes, making it less accessible for users without deep technical expertise, despite the basic GUI Johnny being separate and limited.