Releases: openwall/john-packages
John the Ripper v1.9.1-ce
The v1.9.1-ce version of Openwall John the Ripper password security auditing and recovery tool:
- Contains the Flatpak bundle, macOS binaries, and Windows binaries, as well as all packages compilation logs.
- The Snap package is accessible via Snap Store.
- The Flatpak package is also accessible via FlatHub.
- The Docker image is at https://github.com/openwall/john-packages/pkgs/container/john.
Access and audit the list of released asset attestations.
Warning
Please inspect all packages prior to running any of them to ensure safety. We already know they're safe, but you should verify the security and contents of any binary from the internet you are not familiar with.
Created automatically by Azure DevOps.
🛡 VirusTotal GitHub Action analysis:
Bleeding john 20250312.1
Please download binaries from https://github.com/openwall/john-packages/releases/latest
What we normally call “the bleeding release” does NOT exist at all. [1][2]
[1] the documentation is clear that bleeding is NOT a real release, it's just a tool for use in testing.
[2] See also #749.
🛡 VirusTotal analysis
flatpak_1_JtR.zip
macOS-ARM_1_JtR.7z
macOS-ARM_1_JtR.zip
macOS-Intel_1_JtR.7z
macOS-Intel_1_JtR.zip
winX64_1_JtR.7z
These scans were produced by the VirusTotal GitHub Action
John the Ripper rolling-2404
Please download binaries from https://github.com/openwall/john-packages/releases/latest
Warning
Please inspect all packages prior to running any of them to ensure safety. We already know they're safe, but you should verify the security and contents of any binary from the internet you are not familiar with.
Created automatically by Azure DevOps.
🛡 VirusTotal GitHub Action analysis:
John the Ripper rolling-2310
Please download binaries from https://github.com/openwall/john-packages/releases/latest
Warning
Please inspect all packages prior to running any of them to ensure safety. We already know they're safe, but you should verify the security and contents of any binary from the internet you are not familiar with.
Created automatically by Azure DevOps.
🛡 VirusTotal GitHub Action analysis:
John the Ripper rolling-2304
Please download binaries from https://github.com/openwall/john-packages/releases/latest
Warning
Please inspect all packages prior to running any of them to ensure safety. We already know they're safe, but you should verify the security and contents of any binary from the internet you are not familiar with.
Created automatically by Azure DevOps.
John the Ripper rolling-2210
Please download binaries from https://github.com/openwall/john-packages/releases/latest
Warning
Please inspect all packages prior to running any of them to ensure safety. We already know they're safe, but you should verify the security and contents of any binary from the internet you are not familiar with.
Created automatically by Azure DevOps.
The 1.9.0-jumbo-1 release
Please download binaries from https://github.com/openwall/john-packages/releases/latest
Warning
Please inspect all packages prior to running any of them to ensure safety. We already know they're safe, but you should verify the security and contents of any binary from the internet you are not familiar with.
The stable 1.9.0-jumbo-1 version of Openwall John the Ripper password cracker. This release contains the Flatpak bundle and the Windows binaries. The Snap package is accessible at https://snapcraft.io/john-the-ripper.
Windows .zip
checksums:
Algorithm Hash Path
--------- ---- ----
SHA256 C06274B7AB3064844F4D36F9CE943492EC666FA50B97C595A02A54719DC40398 C:\win_x32.zip
SHA256 75C085D1625B50E70EE2906227DC9EE3722A8D24377057E7E22B5FE8579E9314 C:\win_x64.zip
Flatpak bundle Checksum:
$ sha256sum john.flatpak
5f330b46f4f40035714678aade47155c58d9eee819adef6951d032552c31813d john.flatpak