{"id":13440036,"url":"https://github.com/openwall/john","last_synced_at":"2025-12-16T20:02:41.106Z","repository":{"id":2058953,"uuid":"2997204","full_name":"openwall/john","owner":"openwall","description":"John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs","archived":false,"fork":false,"pushed_at":"2025-05-01T08:25:09.000Z","size":132630,"stargazers_count":11287,"open_issues_count":480,"forks_count":2224,"subscribers_count":271,"default_branch":"bleeding-jumbo","last_synced_at":"2025-05-07T10:52:42.863Z","etag":null,"topics":["assembler","c","cracker","crypt","fpga","gpgpu","gpu","hash","john","jtr","mpi","opencl","openmp","password","ripper","simd"],"latest_commit_sha":null,"homepage":"https://www.openwall.com/john/","language":"C","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":"volojs/create-template","license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/openwall.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2011-12-16T19:43:47.000Z","updated_at":"2025-05-07T10:02:47.000Z","dependencies_parsed_at":"2023-07-05T18:31:44.203Z","dependency_job_id":"75379684-5014-43d7-aaaa-7943eabf7187","html_url":"https://github.com/openwall/john","commit_stats":{"total_commits":14735,"total_committers":193,"mean_commits":76.34715025906736,"dds":0.595249406175772,"last_synced_commit":"b8b5d164d0b3bb15401d837cd4577905b6214ad0"},"previous_names":["magnumripper/johntheripper"],"tags_count":19,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/openwall%2Fjohn","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/openwall%2Fjohn/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/openwall%2Fjohn/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/openwall%2Fjohn/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/openwall","download_url":"https://codeload.github.com/openwall/john/tar.gz/refs/heads/bleeding-jumbo","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":254129481,"owners_count":22019628,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["assembler","c","cracker","crypt","fpga","gpgpu","gpu","hash","john","jtr","mpi","opencl","openmp","password","ripper","simd"],"created_at":"2024-07-31T03:01:19.198Z","updated_at":"2025-12-16T20:02:36.055Z","avatar_url":"https://github.com/openwall.png","language":"C","readme":"[![Circle CI](https://circleci.com/gh/openwall/john/tree/bleeding-jumbo.svg?style=shield)](https://circleci.com/gh/openwall/john/tree/bleeding-jumbo)\n[![Downloads](https://img.shields.io/badge/Download-Windows%20Build-blue.svg)](https://github.com/openwall/john-packages/releases)\n[![License](https://img.shields.io/badge/License-GPL%20v2%2B-blue.svg)](https://github.com/openwall/john/blob/bleeding-jumbo/doc/LICENSE)\n![GitHub commit activity](https://img.shields.io/github/commit-activity/m/openwall/john?color=yellow)\n![GitHub commits since tagged version](https://img.shields.io/github/commits-since/openwall/john/1.9.0-Jumbo-1?color=brown)\n\nJohn the Ripper\n===============\n\nThis is the community-enhanced, \"jumbo\" version of John the Ripper.\nIt has a lot of code, documentation, and data contributed by jumbo\ndevelopers and the user community.  It is easy for new code to be added\nto jumbo, and the quality requirements are low, although lately we've\nstarted subjecting all contributions to quite some automated testing.\nThis means that you get a lot of functionality that is not necessarily\n\"mature\", which in turn means that bugs in this code are to be expected.\n\nJohn the Ripper homepage is:\n\nhttps://www.openwall.com/john/\n\nIf you have any comments on this release or on JtR in general, please\njoin the john-users mailing list and post in there:\n\nhttps://www.openwall.com/lists/john-users/\n\nFor contributions to John the Ripper jumbo, please use pull requests on\nGitHub:\n\nhttps://github.com/openwall/john/blob/bleeding-jumbo/CONTRIBUTING.md\n\nIncluded below is basic John the Ripper core documentation.\n\n---\n\n##\tJohn the Ripper password cracker.\n\nJohn the Ripper is a fast password cracker, currently available for\nmany flavors of Unix, macOS, Windows, DOS, BeOS, and OpenVMS (the latter\nrequires a contributed patch).  Its primary purpose is to detect weak\nUnix passwords.  Besides several crypt(3) password hash types most\ncommonly found on various Unix flavors, supported out of the box are\nKerberos/AFS and Windows LM hashes, as well as DES-based tripcodes, plus\nhundreds of additional hashes and ciphers in \"-jumbo\" versions.\n\n\n##\tHow to install.\n\nSee [INSTALL](doc/INSTALL) for information on installing John on your system.\n\n\n##\tHow to use.\n\nTo run John, you need to supply it with some password files and\noptionally specify a cracking mode, like this, using the default order\nof modes and assuming that \"passwd\" is a copy of your password file:\n\n\tjohn passwd\n\nor, to restrict it to the wordlist mode only, but permitting the use\nof word mangling rules:\n\n\tjohn --wordlist=password.lst --rules passwd\n\nCracked passwords will be printed to the terminal and saved in the\nfile called $JOHN/john.pot (in the documentation and in the\nconfiguration file for John, \"$JOHN\" refers to John's \"home\ndirectory\"; which directory it really is depends on how you installed\nJohn).  The $JOHN/john.pot file is also used to not load password\nhashes that you already cracked when you run John the next time.\n\nTo retrieve the cracked passwords, run:\n\n\tjohn --show passwd\n\nWhile cracking, you can press any key for status, or 'q' or Ctrl-C to\nabort the session saving its state to a file ($JOHN/john.rec by\ndefault).  If you press Ctrl-C for a second time before John had a\nchance to complete handling of your first Ctrl-C, John will abort\nimmediately without saving.  By default, the state is also saved every\n10 minutes to permit for recovery in case of a crash.\n\nTo continue an interrupted session, run:\n\n\tjohn --restore\n\nThese are just the most essential things you can do with John.  For\na complete list of command line options and for more complicated usage\nexamples you should refer to OPTIONS and EXAMPLES, respectively.\n\nPlease note that \"binary\" (pre-compiled) distributions of John may\ninclude alternate executables instead of just \"john\".  You may need to\nchoose the executable that fits your system best, e.g. \"john-omp\" to\ntake advantage of multiple CPUs and/or CPU cores.\n\n\n##\tFeatures.\n\nJohn the Ripper is designed to be both feature-rich and fast.  It\ncombines several cracking modes in one program and is fully\nconfigurable for your particular needs (you can even define a custom\ncracking mode using the built-in compiler supporting a subset of C).\nAlso, John is available for several different platforms which enables\nyou to use the same cracker everywhere (you can even continue a\ncracking session which you started on another platform).\n\nOut of the box, John supports (and autodetects) the following Unix\ncrypt(3) hash types: traditional DES-based, \"bigcrypt\", BSDI extended\nDES-based, FreeBSD MD5-based (also used on Linux and in Cisco IOS), and\nOpenBSD Blowfish-based (now also used on some Linux distributions and\nsupported by recent versions of Solaris).  Also supported out of the box\nare Kerberos/AFS and Windows LM (DES-based) hashes, as well as DES-based\ntripcodes.\n\nWhen running on Linux distributions with glibc 2.7+, John 1.7.6+\nadditionally supports (and autodetects) SHA-crypt hashes (which are\nactually used by recent versions of Fedora and Ubuntu), with optional\nOpenMP parallelization (requires GCC 4.2+, needs to be explicitly\nenabled at compile-time by uncommenting the proper OMPFLAGS line near\nthe beginning of the Makefile).\n\nSimilarly, when running on recent versions of Solaris, John 1.7.6+\nsupports and autodetects SHA-crypt and SunMD5 hashes, also with\noptional OpenMP parallelization (requires GCC 4.2+ or recent Sun Studio,\nneeds to be explicitly enabled at compile-time by uncommenting the\nproper OMPFLAGS line near the beginning of the Makefile and at runtime\nby setting the OMP_NUM_THREADS environment variable to the desired\nnumber of threads).\n\n\"-jumbo\" versions add support for hundreds of additional hash and cipher\ntypes, including fast built-in implementations of SHA-crypt and SunMD5,\nWindows NTLM (MD4-based) password hashes, various macOS and Mac OS X\nuser password hashes, fast hashes such as raw MD5, SHA-1, SHA-256, and\nSHA-512 (which many \"web applications\" historically misuse for\npasswords), various other \"web application\" password hashes, various SQL\nand LDAP server password hashes, and lots of other hash types, as well\nas many non-hashes such as SSH private keys, S/Key skeykeys files,\nKerberos TGTs, encrypted filesystems such as macOS .dmg files and\n\"sparse bundles\", encrypted archives such as ZIP (classic PKZIP and\nWinZip/AES), RAR, and 7z, encrypted document files such as PDF and\nMicrosoft Office's - and these are just some examples.  To load some of\nthese larger files for cracking, a corresponding bundled *2john program\nshould be used first, and then its output fed into JtR -jumbo.\n\n\n##\tGraphical User Interface (GUI).\n\nThere is an official GUI for John the Ripper: Johnny.\n\nDespite the fact that Johnny is oriented onto JtR core, all basic\nfunctionality is supposed to work in all versions, including jumbo.\n\nJohnny is a separate program, therefore you need to have John the Ripper\ninstalled in order to use it.\n\nMore information about Johnny and its releases is on the wiki:\n\nhttps://openwall.info/wiki/john/johnny\n\n\n##\tDocumentation.\n\nThe rest of documentation is located in separate files, listed here in\nthe recommended order of reading:\n\n* [INSTALL](doc/INSTALL) - installation instructions\n* [OPTIONS](doc/OPTIONS) - command line options and additional utilities\n* [MODES](doc/MODES) - cracking modes: what they are\n* [CONFIG](doc/CONFIG) (*) - how to customize\n* [RULES](doc/RULES) (*) - wordlist rules syntax\n* [EXTERNAL](doc/EXTERNAL) (*) - defining an external mode\n* [EXAMPLES](doc/EXAMPLES) - usage examples - strongly recommended\n* [FAQ](doc/FAQ) - guess\n* [CHANGES](doc/CHANGES) (*) - history of changes\n* [CONTACT](doc/CONTACT) (*) - how to contact the author or otherwise obtain support\n* [CREDITS](doc/CREDITS) (*) - credits\n* [LICENSE](doc/LICENSE) - copyrights and licensing terms\n* [COPYING](doc/COPYING) - GNU GPL version 2, as referenced by LICENSE above\n\n(*) most users can safely skip these.\n\nThere are a lot of additional documentation files in jumbo's \"doc\"\ndirectory, which you'll also want to explore.\n\nHappy reading!\n","funding_links":[],"categories":["C","C (286)","c","John the Ripper"],"sub_categories":["Web interfaces"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fopenwall%2Fjohn","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fopenwall%2Fjohn","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fopenwall%2Fjohn/lists"}