Releases: openwall/john-packages
Bleeding john 20241119.1
The under development version of Openwall John the Ripper password security auditing and recovery tool:
- Contains the Flatpak bundle, macOS binaries, and Windows binaries, as well as all packages compilation logs.
- The Snap package is accessible via Snap Store edge channel.
- The Docker image is at https://github.com/openwall/john-packages/pkgs/container/john.
Access and audit the list of released asset attestations.
Warning
Using the bleeding package in temporary test environments is fine, but the end user should NOT use it for day by day tasks.
Please inspect all packages prior to running any of them to ensure safety. We already know they're safe, but you should verify the security and contents of any binary from the internet you are not familiar with.
Created automatically by Azure DevOps.
🛡 VirusTotal GitHub Action analysis:
John the Ripper rolling-2404
The 1.9.0 Jumbo 1+ (1.9J1+2404) version of Openwall John the Ripper password security auditing and recovery tool:
- Contains the Flatpak bundle, macOS binaries, and Windows binaries, as well as all packages compilation logs.
- The Snap package is accessible via Snap Store.
- The Flatpak package is also accessible via FlatHub.
- The Docker image is at https://github.com/openwall/john-packages/pkgs/container/john.
NOTE: please inspect all packages prior to running any of them to ensure safety. We already know they're safe, but you should verify the security and contents of any binary from the internet you are not familiar with.
Created automatically by Azure DevOps.
🛡 VirusTotal GitHub Action analysis:
John the Ripper rolling-2310
This is a rolling 1.9.0 Jumbo 1+ version of Openwall John the Ripper password cracker.
- Contains the Flatpak bundle, macOS binaries, and Windows binaries, as well as all packages compilation logs.
- The Snap package is accessible via Snap Store.
- The Flatpak package is also accessible via FlatHub.
- The Docker image is at https://github.com/openwall/john-packages/pkgs/container/john.
NOTE: please inspect all packages prior to running any of them to ensure safety. We already know they're safe, but you should verify the security and contents of any binary from the internet you are not familiar with.
Created automatically by Azure DevOps.
🛡 VirusTotal GitHub Action analysis:
John the Ripper rolling-2304
This is a rolling 1.9.0 Jumbo 1+ version of Openwall John the Ripper password cracker.
- Contains the Flatpak bundle and the Windows binaries, as well as all packages compilation logs.
- The Snap package is accessible via Snap Store stable channel.
- The Docker image is at https://github.com/openwall/john-packages/pkgs/container/john.
NOTE: please inspect all packages prior to running any of them to ensure safety. We already know they're safe, but you should verify the security and contents of any binary from the internet you are not familiar with.
Created automatically by Azure DevOps.
John the Ripper rolling-2210
This is a rolling 1.9.0 Jumbo 1+ version of Openwall John the Ripper password cracker.
- Contains the Flatpak bundle and the Windows binaries, as well as all packages compilation logs.
- The Snap package is accessible via Snap Store stable channel.
- The Docker image is at https://github.com/openwall/john-packages/pkgs/container/john.
NOTE: please inspect all packages prior to running any of them to ensure safety. We already know they're safe, but you should verify the security and contents of any binary from the internet you are not familiar with.
Created automatically by Azure DevOps.
The 1.9.0-jumbo-1 release
You should strongly consider using the John bleeding package (the development version).
Or the rolling release.
The stable 1.9.0-jumbo-1 version of Openwall John the Ripper password cracker. This release contains the Flatpak bundle and the Windows binaries, as well as all packages compilation logs. The Snap package is accessible at https://snapcraft.io/john-the-ripper.
NOTE: Please inspect all packages prior to running any of them to ensure safety. We already know they're safe, but you should verify the security and contents of any binary from the internet you are not familiar with.
Windows .zip
checksums:
Algorithm Hash Path
--------- ---- ----
SHA256 C06274B7AB3064844F4D36F9CE943492EC666FA50B97C595A02A54719DC40398 C:\win_x32.zip
SHA256 75C085D1625B50E70EE2906227DC9EE3722A8D24377057E7E22B5FE8579E9314 C:\win_x64.zip
Flatpak bundle Checksum:
$ sha256sum john.flatpak
5f330b46f4f40035714678aade47155c58d9eee819adef6951d032552c31813d john.flatpak