John the Ripper password cracker
John the Ripper is an Open Source password security auditing and password recovery tool available for many operating systems. John the Ripper jumbo supports hundreds of hash and cipher types, including for: user passwords of Unix flavors (Linux, *BSD, Solaris, AIX, QNX, etc.), macOS, Windows, "web apps" (e.g., WordPress), groupware (e.g., Notes/Domino), and database servers (SQL, LDAP, etc.); network traffic captures (Windows network authentication, WiFi WPA-PSK, etc.); encrypted private keys (SSH, GnuPG, cryptocurrency wallets, etc.), filesystems and disks (macOS .dmg files and "sparse bundles", Windows BitLocker, etc.), archives (ZIP, RAR, 7z), and document files (PDF, Microsoft Office's, etc.) These are just some of the examples - there are many more.
John the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance.
Proceed to John the Ripper Pro homepage for your OS:
Download the latest John the Ripper jumbo release (release notes) or development snapshot:
Run John the Ripper jumbo in the cloud (AWS):
Download the latest John the Ripper core release (release notes):
These and older versions of John the Ripper, patches, unofficial builds, and many other related files are also available from the Openwall file archive.
You can browse the documentation for John the Ripper core online, including a summary of changes between core versions. Also relevant is our presentation on the history of password security.
There's a collection of wordlists for use with John the Ripper. It includes lists of common passwords, wordlists for 20+ human languages, and files with the common passwords and unique words for all the languages combined, also with mangling rules applied and any duplicates purged.
yescrypt and crypt_blowfish are implementations of yescrypt, scrypt, and bcrypt - some of the strong password hashes also found in John the Ripper - released separately for defensive use in your software or on your servers.
passwdqc is a proactive password/passphrase strength checking and policy enforcement toolset, which can prevent your users from choosing passwords that would be easily cracked with programs like John the Ripper.
We may help you integrate modern password hashing with yescrypt or crypt_blowfish, and/or proactive password strength checking with passwdqc, into your OS installs, software, or online services. Please check out our services.
There's a mailing list where you can share your experience with John the Ripper and ask questions. Please be sure to specify an informative message subject whenever you post to the list (that is, something better than "question" or "problem"). To subscribe, enter your e-mail address below or send an empty message to <john-users-subscribe at lists.openwall.com>. You will be required to confirm your subscription by "replying" to the automated confirmation request that will be sent to you. You will be able to unsubscribe at any time and we will not use your e-mail address for any other purpose or share it with a third party. However, if you post to the list, other subscribers and those viewing the archives may see your address(es) as specified on your message. The list archive is available locally and via MARC. Additionally, there's a list of selected most useful and currently relevant postings on the community wiki.
Contributed resources for John the Ripper:
Local copies of these and many other related packages are also available from the Openwall file archive.
John the Ripper is part of Owl, Debian GNU/Linux, Fedora Linux, Gentoo Linux, Mandriva Linux, SUSE Linux, and a number of other Linux distributions. It is in the ports/packages collections of FreeBSD, NetBSD, and OpenBSD.
John the Ripper is a registered project with Open Hub and it is listed at SecTools.