BrioList — AI tools discovery and rankings
BrioList
Discover Websites & AI tools • Vote • Rank • Auto-synced
HomeExploreRankings❤️ My FavoritesBlog
Submit Tool
© 2026 BrioListwww.briolist.com
AboutPrivacyTermsContact

Explore AI Tools

Discover the next generation of AI — search, filter, and vote.

Active filters: clear all
All✦Productivity✦Education✦Generators✦Voice✦Dev✦CRM✦SEO✦Analytics✦Text✦Security✦Generators✦Support
PricingFreeFreemiumPaid
TagsPrivate SearchAnonymous BrowsingOnline SecurityVPNPrivate BrowsingRemote AccessDevice Management
Categories
All Tools✦⚡ Productivity✦🎓 Education✦🎥 Video Generators✦🎵 Audio & Voice✦💻 Coding & Dev✦💼 Sales & CRM✦📈 Marketing & SEO
Cybersecurity
phishing protection
security analytics
machine learning
threat intelligence
✦📊 Data & Analytics
✦📝 Copywriting & Text
✦🔒 Security
✦🖼️ Image Generators
✦🤖 Chatbots & Support
Pricing
AllFreeFreemiumPaid
Showing 2 results
Tip: vote on Tool details to boost its pulse score.

Hashcat

Hashcat is a cutting-edge password recovery tool renowned for its speed and efficiency in cracking hashes. It leverages GPU acceleration to process millions of hashes per second, making it ideal for recovering passwords from databases of compromised hashes. Its support for thousands of hashing algorithms ensures compatibility with virtually all stored credentials. Beyond brute-force attacks, Hashcat employs advanced techniques like dictionary attacks, mask generation, and GPU-specific optimizations. This makes it a critical tool for security audits and incident response teams to identify weak credentials. Its open-source model and active community ensure continuous updates, keeping it aligned with the latest cryptographic challenges and attack vectors.

Score
Good
password recoveryhash crackingGPU acceleration
WebsiteView →

John the Ripper

John the Ripper is a fast and versatile password-cracking tool designed for both offline and online hash attacks. It supports a wide range of hashing algorithms, including MD5, SHA-1, and bcrypt, making it essential for security professionals to assess password strength. Its ability to operate in real-time or against pre-collected hashes ensures comprehensive password security audits. By automating brute-force and dictionary attacks, John the Ripper significantly speeds up vulnerability discovery in weak password systems. Security teams use it to identify compromised accounts and enforce stronger password policies. Its active development and open-source nature ensure continuous improvements, aligning it with evolving cryptographic standards and attack methodologies.

Score
Good
password crackinghash analysisaccount security
WebsiteView →