Fact-checked by Grok 2 weeks ago

Openwall Project

The Openwall Project is a community-driven open-source initiative founded in 1999 by Alexander Peslyak, known by the pseudonym Solar Designer, aimed at enhancing information security within open computing environments through software development, research publications, and community resources. Central to the project are its flagship security tools, including John the Ripper, a widely used password cracking and auditing utility originally developed in 1996 that supports numerous hash algorithms, platforms like Linux, Windows, and macOS, and remains actively maintained with community contributions. Other key developments encompass passwdqc, a policy-enforcing password strength checker integrated into various systems since the early 2000s; yescrypt, a memory-hard key derivation function introduced in 2013 to counter GPU-accelerated attacks and adopted by several Linux distributions, including Debian and Fedora; and Linux Kernel Runtime Guard (LKRG), a loadable kernel module launched in 2016 for real-time detection of rootkits and kernel exploits, with its latest stable release (version 1.0.0) supporting Linux kernels 6.13 and later as of September 2025. The project also historically produced Openwall GNU/*/Linux (Owl), a compact, security-hardened for servers and appliances, first released in 2000 and featuring innovations like address space protection and grsecurity patches, though it reached end-of-life by 2018 with minimal maintenance thereafter. Beyond tools, Openwall supports the cybersecurity community via resources such as comprehensive wordlists for auditing, the influential oss-security co-founded in 2008 for coordinating open-source disclosures, and professional services including cloud-based password recovery.

History

Founding and Early Development

The Openwall Project was founded by Alexander Peslyak, known by his pseudonym Solar Designer, in 1999. Peslyak, a computer security specialist born in 1977, had been actively involved in security research since 1997, including pioneering contributions such as the introduction of non-executable memory protections to the . The project built upon his earlier individual efforts, notably the development of , a tool initially released in 1996 as a utility to test on systems. The initial focus of the Openwall Project centered on developing secure, open-source tools for operating systems, particularly to mitigate vulnerabilities in password handling, system auditing, and broader . This emphasis arose from Peslyak's expertise in and , coupled with the escalating internet threats of the late 1990s, such as buffer overflows and weak authentication mechanisms that exposed systems to unauthorized access. By prioritizing or freely licensed code, the project addressed the limitations of proprietary security solutions, promoting transparency and community-driven improvements in an era when open-source alternatives were gaining traction for defensive computing. The project's first public activities included the establishment of its official website in 2001, which served as a central hub for distributing tools and fostering among security researchers. Initial software releases around this time encompassed enhancements to and early prototypes of security patches, laying the groundwork for more comprehensive offerings like the Openwall /*/Linux distribution. These efforts marked a deliberate shift toward proactive, non-proprietary security software, reflecting Peslyak's vision of integrating rigorous auditing into open computing environments.

Key Milestones and Evolution

The Openwall Project marked its initial major milestone with the release of Openwall /*/Linux (Owl) 1.0 in October 2002, providing a security-hardened based on 7.2, emphasizing non-executable stacks, secure temporary file handling, and other defensive measures. This was followed by Owl 2.0 in February 2006, which updated the base to 3 and incorporated enhancements for better server security, including improved auditing and privilege separation. Owl 3.0 arrived in December 2010, coinciding with the project's approximate 10-year anniversary, and introduced support for RHEL 5.5-based kernels with integrated virtualization for containerized environments. The subsequent Owl 3.1 release in January 2015 further refined the distribution by updating to RHEL 5.11 kernels to bolster network security features. Starting around 2005, the project expanded beyond its distribution focus into kernel-level security enhancements, developing patches that addressed information leaks, race conditions, and exploitation vectors in the Linux kernel. These patches gained adoption in major distributions; for instance, Ubuntu integrated Openwall's hardening measures for unsafe temporary file creation into its proactive security roadmap that year, while similar features influenced Fedora's kernel configurations for improved privilege controls. This evolution reflected the project's growing emphasis on upstream contributions to mitigate emerging threats like buffer overflows and symlink attacks across broader Linux ecosystems. In recent years, the Openwall Project has continued advancing its tools amid evolving landscapes. The Runtime Guard (LKRG) reached version 1.0.0 on September 2, 2025, introducing runtime integrity monitoring for kernels 6.13 and later, with optimizations reducing the codebase by approximately 2,500 lines for enhanced performance and reliability. Earlier, in August 2024, the project released yescrypt-go 1.0.0, a pure Go implementation of the yescrypt designed for memory-hard password hashing to resist GPU-accelerated attacks. The project's role in global security was prominently demonstrated in March 2024, when the OSS-security —hosted by Openwall—facilitated the reporting of a backdoor in (CVE-2024-3094), enabling early detection and mitigation to avert widespread remote code execution risks in SSH servers across distributions. This incident underscored Openwall's influence through its communication platforms. Additionally, founder Solar Designer delivered key talks, including one on LKRG advancements at Nullcon 2025 and a on evolution at OffensiveCon 2024, sharing insights on defensive strategies against sophisticated exploits. Over time, the Openwall Project has shifted from a primary focus on its Owl distribution to developing a wider array of ecosystem tools, prioritizing licensing to facilitate unrestricted adoption and avoid proprietary constraints in security software. This approach is evident in releases like yescrypt and portions of , enabling seamless integration into diverse open-source projects while maintaining the project's commitment to accessible, high-impact security enhancements.

Core Software and Tools

Password Cracking and Quality Tools

The Openwall Project has developed , an open-source password cracker initiated in 1996 for auditing and recovering weak passwords across various operating systems including Unix, Windows, and macOS. It supports multiple cracking modes, such as single mode for quick tests using login information, wordlist mode for dictionary attacks, and incremental mode for systematic brute-force attempts with customizable character sets. The community-maintained edition extends the core tool with support for hundreds of hash types and GPU acceleration via and , enabling faster cracking on modern hardware. The latest release, 1.9.0-jumbo-1, includes optimizations for multi-threading and new hash formats. Complementing cracking tools, the project offers passwdqc, a and PAM module for checking during changes, ensuring compliance with configurable rules on minimum length, character class diversity, and passphrase complexity to prevent weak selections. It allows administrators to define parameters like disabling simple patterns or requiring a mix of uppercase, lowercase, digits, and symbols, and has been integrated into base systems of distributions such as since version 5.0 and since 2.2. To enhance resistance against cracking, Openwall introduced yescrypt, a memory-hard (KDF) that extends by incorporating Salsa20/8 and countermeasures against side-channel and hardware attacks, making it particularly effective against GPU and ASIC-based brute-force attempts. Key parameters include N as the primary cost factor controlling and time usage, r for size, and p for parallelization threads, allowing tunable levels. In 2024, a pure Go reimplementation, yescrypt-go 1.0.0, was released to facilitate integration in Go-based applications while maintaining compatibility with the original reference. These tools are commonly integrated into security auditing workflows, such as penetration testing suites like Kali Linux, where John the Ripper analyzes leaked credential dumps. Performance benchmarks illustrate their efficiency: on a single-core AMD Ryzen 7 8700F at 4.1 GHz, John the Ripper achieves approximately 214,000 candidates per second for MD5 hashes and 2,091 candidates per second for bcrypt (cost 5), while multi-threaded setups like a 96-thread AMD EPYC 7R32 scale to 4.6 million c/s for MD5 and 86,800 c/s for bcrypt, highlighting the impact of hardware parallelism. Openwall's wordlists collection can augment these tools for dictionary-based attacks. External resources like the Have I Been Pwned (HIBP) dataset, updated in November 2025 with over 1.3 billion additional unique passwords, further enhance dictionary attack simulations for research, though Openwall's core collection remains at approximately 40 million unique entries as of 2025.

Kernel and System Security Enhancements

The Openwall Project has contributed to kernel and system security through specialized patches for the , focusing on hardening measures to mitigate common exploitation vectors. These patches, initially developed for older kernel series such as 2.4.x, include features like non-executable stacks to prevent exploits from executing malicious code on the stack, enhancements to (ASLR) by enforcing stricter minimum address mappings (e.g., via vm.mmap_min_addr), and protections against log spoofing to ensure audit logs cannot be manipulated by attackers with partial access. In the Openwall /*/Linux (Owl) distribution from version 3.0 onward, these enhancements are integrated, with a key policy of disabling SUID binaries by default to eliminate risks associated with execution, while maintaining system usability through alternative privilege management mechanisms like owl-control. Some of these hardening techniques have influenced upstream developments, such as personality feature restrictions to block deprecated compatibility modes exploitable for attacks, and have parallels with projects like grsecurity in promoting proactive exploit mitigations. A core philosophy in Openwall's kernel and system security approach is minimizing the (TCB) by auditing and reducing privileged code execution. This involves rigorous source code reviews for components that run with elevated privileges, such as system libraries, daemons, and network services, to identify and eliminate unnecessary privilege assumptions that could lead to vulnerabilities. Unlike heavier systems like SELinux, Openwall employs lighter, custom policies that enforce least without extensive labeling overhead, integrating these into Owl's runtime environment to limit the attack surface of the TCB. For instance, Owl avoids default inclusion of SUID/SGID programs and uses privilege separation in services, ensuring that only essential code paths require root access, thereby reducing the potential impact of flaws in third-party software. This TCB-focused design prioritizes code quality and safe defaults over runtime enforcement bloat, aligning with Openwall's broader security ethos. The Runtime Guard (LKRG), maintained under the Openwall Project, provides runtime integrity monitoring as a to detect and respond to kernel-level exploits. LKRG hooks into system calls and kernel structures to monitor for anomalies such as , unauthorized modifications to syscall tables, IRQ handlers, and the .rodata section, enabling early detection of rootkits and privilege escalations. Version 1.0.0, released in 2025, streamlined the codebase by approximately 1,500 lines for improved maintainability while adding support for kernels up to 6.17-rc4, including compatibility with modern distributions like RHEL and . To resist evasion, LKRG incorporates self-hiding mechanisms, such as concealing its presence from lists via parameters like lkrg.hide, making it harder for attackers to disable or unload the guard during an intrusion. These features position LKRG as a complementary tool to static hardening, focusing on dynamic threat detection without requiring kernel recompilation.

Resource Collections and Public Domain Code

The Openwall Project maintains a curated collection of wordlists designed to support password security auditing and recovery efforts. This collection includes comprehensive dictionaries covering over 20 languages, such as English, , and Japanese, along with lists of common s derived from various public sources. Notable examples incorporate integrations like the rockyou.txt and custom mangled variants (e.g., with appended digits or ), with the full encompassing approximately 40 million unique entries after duplicate purging. These wordlists, available in a freely downloadable reduced exceeding 50 MB and a full edition around 500 MB, are optimized for use with tools like , facilitating efficient cracking and strength testing in controlled environments. In parallel, the project curates a list of public domain software implementations for cryptographic algorithms, ensuring source code free from licensing restrictions to encourage widespread reuse. This includes portable, optimized implementations of algorithms such as for encryption, SHA family hashes for integrity verification, and replacements for the crypt(3) password hashing function, all written in C and placed explicitly in the by project founder Alexander Peslyak (Solar Designer). These resources are documented on the Openwall Community Wiki, providing examples and frameworks that developers can integrate directly into security tools without proprietary concerns. Complementing these, the Openwall file serves as a central for all project software revisions dating back to , including historical releases of tools, data files, and user-contributed materials. Hosted at download.openwall.net with multiple mirrors for redundancy and reliability, the ensures long-term and supports version-specific in experiments. Collectively, these resources promote reproducible research by eliminating proprietary barriers, allowing academics and testers to leverage high-quality, unrestricted data and code. Adoption is evident in academic papers on password analysis and commercial pentesting suites that incorporate the wordlists for , as well as open-source projects embedding the crypto implementations for compliant deployments.

Openwall GNU/*/Linux Distribution

Design Principles and Features

The Openwall GNU/*/Linux (Owl) distribution is designed as a small, security-enhanced server platform, emphasizing a minimal footprint suitable for servers, appliances, and virtual environments. At its core, Owl combines the GNU userland with a Linux kernel, ensuring compatibility with standard GNU/Linux distributions such as binary and package equivalence with Red Hat Enterprise Linux 4, CentOS 4, and Fedora Core 3 in earlier releases. Early releases supported multiple processor architectures including x86, x86-64, SPARC, and Alpha, though support for SPARC and Alpha ended after version 2.0. while rebuilding the entire system from source using a "make buildworld" process and distributing binary packages via RPM for ease of deployment. A key aspect of Owl's design incorporates security concepts from , such as privilege separation and safe defaults, to enhance overall system integrity. Notable integrations include the Blowfish-based password hashing method (via crypt_blowfish), which provides robust protection against brute-force attacks and is fully compatible with OpenBSD's implementation, and for secure remote access with built-in privilege separation to limit the impact of potential exploits. These elements contribute to Owl's focus on proactive security hardening rather than relying solely on reactive patching. Owl's features prioritize exploit prevention and minimal attack surface, with no SUID binaries enabled by default—instead, they are managed through the owl-control tool to enforce the principle of least privilege. Role-based access controls further restrict privileges, while hardened implementations like a secure guard against heap overflows, and modifications prevent spoofing of log entries. Additional protections include proactive audits for privileged and network-facing components, mitigations, strong cryptography defaults, and integrity checks using tools like , all aimed at reducing the (TCB) and making the system more audit-friendly through detailed logging. In contrast to mainstream distributions, emphasizes integrated minimization and inherent hardening measures, such as support for virtual appliances via containers, to create a more resilient environment from the ground up without depending heavily on frequent updates. This approach combines multiple strategies to diminish both the number and severity of vulnerabilities, positioning as a specialized platform for high-security deployments.

Release History and Maintenance

The Openwall GNU/*/Linux (Owl) distribution has seen a series of releases since its inception, each building on prior versions with updates to the and security enhancements tailored for environments. The project maintained a conservative release cadence, focusing on stability and rather than frequent updates, with major versions spaced several years apart. Early releases targeted 32-bit x86 architectures, while later ones introduced support.
VersionRelease DateKernel VersionKey Notes
0.1August 20022.2.20-ow1Initial stable release following prerelease snapshots; introduced core security features like non-executable stack patches.
1.0October 15, 20022.2.22-ow1First full release with improved package management and bug fixes over 0.1; marked transition to stable branching.
1.1December 23, 20032.4.23-ow2Upgraded to Linux 2.4 series with enhanced server tools and vulnerability fixes; included Openwall kernel patches for better access controls.
2.0February 14, 20062.4.32-ow1Major update with glibc 2.3.6 and compatibility layers for RHEL4/Fedora Core 3; added support for more hardware and security auditing tools.
3.0December 16, 20102.6.18 (RHEL 5.5-based)Shift to 2.6 kernel with OpenVZ integration for virtualization and ext4 filesystem support; introduced x86-64 architecture.
3.1January 5, 20152.6.18 (RHEL 5.11-based)Stable branch release with backported security fixes; ISO images followed in 2018 for i686 and x86-64, focusing on long-term stability.
Post-2015, Owl received sporadic updates, including security patches and ISO refreshes in 2016 and 2018 to address critical vulnerabilities like CVE-2015-0235 (GHOST) and kernel exploits. The distribution reached end-of-life in 2018, with no updates since the 2018 ISO releases. Maintenance for early versions (0.1 through 2.0) ceased shortly after their stable branches, rendering them unsupported and unsuitable for production due to unpatched vulnerabilities in outdated kernels. Owl 3.1 remains the latest stable version, with ongoing but minimal support limited to critical security patches backported to its RHEL 5.11 base; no new major releases are planned, as announced in late 2014. Community-driven mirrors, such as those on mirrors.kernel.org and ibiblio.org, host archives and snapshots, facilitating access for historical or specialized use cases. Upgrade paths emphasize , allowing installations from earlier versions (e.g., 2.0 to 3.0) via RPM package updates without full reinstalls, though kernel jumps require careful testing for hardware support. Modern deployments often integrate 3.1 images with containerization tools like or templates for isolated environments, preserving its security model on contemporary infrastructure. The project's maintenance challenges stem from a strategic shift toward upstream contributions to distributions like ALT Linux, which incorporate Owl's security enhancements (e.g., grsecurity patches and non-setuid design), diminishing the need for standalone Owl releases. This evolution reflects broader trends in open-source security, prioritizing integration over bespoke distro maintenance.

Publications and Community Contributions

PoC||GTFO Journal

The PoC||GTFO, formally known as the International Journal of Proof-of-Concept or Get The Fuck Out, is a samizdat-style zine dedicated to computer security, reverse engineering, and proof-of-concept demonstrations in hacking. Launched in August 2013 with issue 0x00, it is curated by a collective of contributors including Ange Albertini under the editorial pseudonym Pastor Manul Laphroaig, with issues released irregularly based on submissions. As of February 2024, the journal has published up to issue 0x22 (34 in decimal), with a total of 35 issues, maintaining a focus on practical, code-inclusive explorations rather than theoretical discourse. The content themes of PoC||GTFO revolve around proof-of-concept exploits, techniques, deep dives into internals, and the creation of polyglot files that exploit multiple parsers simultaneously. Articles typically include executable code snippets, diagrams, and visual aids to illustrate concepts, emphasizing reproducibility and creativity in security research. A representative example is the article in issue 15 (0x0F) detailing the cracking of (JKS) private key passwords using an overclocked GTX 1080 GPU, which highlights efficient brute-force methods with integration for penetration testing. PoC||GTFO is distributed primarily in PDF format, optimized for print-ready output on or Tabloid paper to facilitate DIY production and physical sharing among readers. The issues are mirrored on the Openwall Project website in compliance with its license, which explicitly encourages copying, remixing, and unrestricted dissemination to promote underground knowledge exchange. This licensing model aligns with the journal's of , allowing contributors and readers to adapt materials freely without commercial restrictions. The journal plays a significant role in fostering by democratizing advanced security knowledge through engaging, non-academic formats that prioritize "show me the code" over abstract theory. Its articles have been incorporated into professional training for embedded ARM reversing and exploit development, such as the guide on dissecting binaries for vulnerability hunting in devices. In 2017, No Starch Press released PoC or GTFO, a book compiling over 80 essays from the journal's early issues, which broadened its influence in the cybersecurity community and underscored its educational impact. Subsequent compilations include PoC or GTFO, Volume 2 (2018) and Volume 3 (2021), published by , collecting essays from later issues.

Security Mailing Lists and Announcements

The OSS-security mailing list, established by the Openwall Project on February 17, 2008, serves as a primary venue for discussions on flaws, concepts, and practices within the community, targeting projects, distributors, researchers, and developers. Hosted at lists.openwall.com, the list operates under a that encourages responsible and collaboration, with archives maintained at openwall.com and seclists.org for accessibility. It has become a key forum for vulnerability reports, exemplified by the March 29, 2024, of a backdoor in (CVE-2024-3094), which prompted rapid global remediation efforts across distributions, with fixes widely deployed by May 2024. Openwall maintains a news archive dating back to 2001, documenting project updates, infrastructure developments such as the establishment of file archives and mirrors in 2010, and community contributions like enhancements to tools. These announcements, disseminated via the project's announce and , cover milestones including the setup of download mirrors for distributions and tools, ensuring reliable access to resources for researchers and users. The mailing lists, particularly OSS-security and the associated linux-distros list, play a significant role in community impact by facilitating vendor coordination on vulnerability responses and patches, with moderation led by Solar Designer (Alexander Peslyak), founder of Openwall. This coordination is supported through the OSS-Security wiki at oss-security.openwall.org, which integrates links to bug trackers, security contacts, and advisories for various open-source projects and vendors, enabling efficient tracking and resolution of issues. The Open Source Security Foundation (OpenSSF) has recognized these lists as essential for secure communication in open-source ecosystems since at least 2023. Additional announcements from Openwall include initiatives like the Summer of Security program, launched in 2011 to support student contributions to security projects, including ideas for s and talks on topics such as vulnerability disclosure practices.

References

  1. [1]
    Alexander Peslyak's bio - Openwall Community Wiki
    Jun 2, 2020 · Alexander Peslyak, better known as Solar Designer, has been professionally involved in computer and network security since 1997.
  2. [2]
    Openwall - bringing security into open computing environments
    Start your password recovery or audit in AWS cloud in minutes, complete it within our 5-day free trial or support our Open Source project afterwards. July 8 ...John the Ripper password ...ServicesPasswdqcOpenwall GNU/*/Linux (Owl)What's new
  3. [3]
    John the Ripper password cracker - Openwall
    John the Ripper is an Open Source password security auditing and password recovery tool available for many operating systems.John the Ripper Pro · Pro for macOS · How to install · Openwall services
  4. [4]
  5. [5]
    Openwall GNU/*/Linux (Owl) - a security-enhanced server platform
    Openwall GNU/*/Linux (or Owl for short) is a small security-enhanced Linux distribution for servers, appliances, and virtual appliances.DownloadConcepts
  6. [6]
    Who Is Alexander Peslyak? - Threat Picture
    Nov 21, 2022 · In 1999, Peslyak founded the Openwall Project, the new home of his free cybersecurity software projects and research. In addition to hosting his ...
  7. [7]
    Solar Designer - Senior Principal Security Engineer - CIQ
    He has been security-hardening Linux since 1997, when he was first to introduce non-executable memory to Linux, then founding and maintaining the Openwall GNU ...Missing: history | Show results with:history
  8. [8]
    john-users - Re: When was John created? - Openwall
    Sep 10, 2015 · ... date of John the Ripper, but have so far been unsuccessful. John the Ripper 1.0 was released in 1996 as a drop-in replacement for Cracker ...
  9. [9]
    Solar Designer - OffensiveCon
    Alexander Peslyak, better known as Solar Designer, is the founder of Openwall, a community project and professional services company focused on security of Open ...
  10. [10]
    [PDF] Memory Errors: The Past, the Present, and the Future
    The first non-executable stack countermeasure was proposed by. Alexander Peslyak (Solar Designer) in June 1997 for the Linux kernel [31], [36], [37] (Figure 2).
  11. [11]
    Openwall Project news items (since 2001)
    ... Openwall project - has been updated to build upon JtR 1.7. ... There's also the pre-FOSDEM interview with Solar Designer available on the conference website.
  12. [12]
    Openwall GNU/*/Linux - DistroWatch.com
    May 17, 2025 · • 2003-12-24: Distribution Release: Openwall GNU/*/Linux 1.1 • 2002-10-15: Distribution Release: Openwall GNU/Linux 1.0 • More Openwall ...
  13. [13]
    owl-users - Openwall GNU/*/Linux (Owl) 1.0 release
    Message-ID: <20021016051925.GA17431@openwall.com> Date: Wed, 16 Oct 2002 09:19:25 +0400 From: Solar Designer <solar@...nwall.com> To: announce@...ts.
  14. [14]
    [openwall-announce] Openwall GNU/*/Linux 3.0 is out, marks 10 ...
    Dec 15, 2010 · I am pleased to announce that we have made a new major release of Openwall GNU/*/Linux, version 3.0. ISO images of the CDs for i686 and x86-64 are available ...
  15. [15]
    Linux kernel security hardening patch from the Openwall Project
    The Openwall Linux kernel patch is a historical project that includes security fixes, such as for information leaks, and a fix for the "personality" hardening ...
  16. [16]
    UbuntuDownUnder/BOFs/ProactiveSecurityRoadmap - Ubuntu Wiki
    Apr 24, 2005 · Kernel: Port the OpenWall patch that prevents exploitation of unsafe temporary file creation; it is really trivial; add a proc file to be ...
  17. [17]
    [openwall-announce] LKRG 1.0.0
    Sep 2, 2025 · LKRG is a kernel module for runtime integrity checking and detecting security exploits. LKRG 1.0.0 supports latest mainline Linux kernels.
  18. [18]
    [openwall-announce] yescrypt-go 1.0.0
    Aug 21, 2024 · This is to announce the first release of yescrypt-go, which is our pure Go reimplementation of yescrypt. It currently supports (only a little more than) the ...
  19. [19]
    backdoor in upstream xz/liblzma leading to ssh server compromise
    Mar 29, 2024 · The upstream xz repository and the xz tarballs have been backdoored. At first I thought this was a compromise of debian's package, but it turns out to be ...
  20. [20]
    Linux Kernel Runtime Guard (LKRG) 1.0 (Nullcon Berlin 2025)
    These are the slides of Solar Designer's talk at Nullcon Berlin 2025. A video recording of the talk will likely be posted by Nullcon organizers soon.
  21. [21]
    John the Ripper documentation - Openwall
    John the Ripper is a fast password cracker, currently available for many flavors of Unix, macOS, Windows, DOS, BeOS, and OpenVMS.Examples · Options · FAQ · Cracking modesMissing: Project | Show results with:Project
  22. [22]
    John the Ripper jumbo - advanced offline password cracker ... - GitHub
    John the Ripper homepage is: https://www.openwall.com/john/. If you have any comments on this release or on JtR in general, please join the john-users ...
  23. [23]
    passwdqc - password/passphrase strength checking and enforcement
    passwdqc is a password/passphrase strength checking and policy enforcement toolset, including an optional PAM module (pam_passwdqc), command-line programs.
  24. [24]
    yescrypt - scalable KDF and password hashing scheme - Openwall
    yescrypt is a password-based key derivation function (KDF) and password hashing scheme. It builds upon scrypt and includes classic scrypt, a minor extension ...
  25. [25]
    john | Kali Linux Tools
    Aug 26, 2025 · John the Ripper is a tool designed to help systems administrators to find weak (easy to guess or crack through brute force) passwords.<|control11|><|separator|>
  26. [26]
    John the Ripper benchmarks - Openwall Community Wiki
    Collected "john --test" benchmarks for OpenMP-enabled builds. DES crypt() many / one salt, MD5 crypt(), bcrypt x32, LM (Windows LanMan), CPUs & clock rate ...
  27. [27]
    Linux kernel patch from the Openwall Project: FAQ
    The Openwall Linux kernel patch - a collection of security "hardening" features aimed at reducing the likelihood and/or impact of successful exploitation of ...
  28. [28]
    Openwall GNU/*/Linux (Owl) - changes made in 3.0-stable branch
    This file lists all changes made between Owl 3.0 and its corresponding stable branch. Please note that the release itself remains fixed; it's only the stable ...Missing: distribution history
  29. [29]
    Openwall GNU/*/Linux (Owl) - concepts
    ### Summary of Openwall GNU/*/Linux and Openwall Project Origins, Founding, Motivations, and Early History
  30. [30]
    [PDF] Openwall GNU/*/Linux a security-enhanced OS
    Openwall GNU/*/Linux (Owl). A security-enhanced server platform based ... Owl: Features. A base for installing whatever software is generally available ...
  31. [31]
    Linux Kernel Runtime Guard: LKRG
    These and older versions of LKRG are also available from the Openwall file archive. The source code and revision history of LKRG can be browsed on GitHub.
  32. [32]
    lkrg-org/lkrg: Linux Kernel Runtime Guard - GitHub
    LKRG performs runtime integrity checking of the Linux kernel and detection of security vulnerability exploits against the kernel.
  33. [33]
    [openwall-announce] "Linux Kernel Runtime Guard (LKRG) 1.0 ...
    Sep 20, 2025 · The project was founded by Adam 'pi3' Zabrocki, who invited Solar ... Linux Kernel Runtime Guard (LKRG) under the hood" (2018). These ...
  34. [34]
    Openwall wordlists collection
    An extensive collection of wordlists for 20+ languages and lists of common passwords intended for use with password recovery, password cracking, ...
  35. [35]
    Index of /pub/wordlists
    Index of /pub/wordlists. Name Last modified Size. [DIR] Parent Directory 07-Sep-2018 23:31 - [DIR] languages/ 08-Oct-2003 14:00 - [DIR] passwords/ 24-Nov-2011 ...
  36. [36]
    john-users - Re: source of information for John's charset files
    May 2, 2021 · ... HIBP v7 set. The HIBP v7 set is 613M+ unique passwords from 3.65 billion accounts (a figure I calculated by adding up the counts included in ...
  37. [37]
    Source code snippets and frameworks placed in the public domain
    Nov 15, 2017 · This is some program source code I have written and placed in the public domain. Public domain source code snippets and frameworks in C.
  38. [38]
    A portable, fast, and free implementation of the MD5 Message ...
    Jun 16, 2016 · MD5 Message-Digest Algorithm (RFC 1321). Written by Solar Designer <solar at openwall.com> in 2001 and placed in the public domain. There's ...
  39. [39]
    Openwall file archive (downloads)
    This is a place to download software and data files from the Openwall Project, as well as user contributions and some other related files.
  40. [40]
  41. [41]
    bcrypt password hashing for your software and your servers
    This is an implementation of bcrypt, a password hashing method based on the Blowfish block cipher, provided via the crypt(3) and a reentrant interface.
  42. [42]
    Changes made between Owl 0.1-prerelease and Owl 0.1-stable.
    A new revision of the Openwall Linux kernel patch, 2.2.19-ow3, is now available. It contains fixes for two Linux kernel vulnerabilities discovered by Rafal ...Missing: enhancements | Show results with:enhancements<|control11|><|separator|>
  43. [43]
    Distribution Release: Openwall GNU/Linux 1.0 (DistroWatch.com ...
    Openwall GNU/Linux, also known as "Owl" is a security-enhanced operating system for Alpha, ix86 and SPARC architectures with Linux 2.2.22 and GNU software as ...
  44. [44]
    owl-users - Openwall GNU/*/Linux (Owl) 2.0 release
    Openwall · Products · Openwall GNU/*/Linux server OS · Linux Kernel ... GA29268@openwall.com> Date: Thu, 16 Feb 2006 00:49:05 +0300 From: Solar Designer < ...
  45. [45]
    [openwall-announce] Owl 3.1-stable
    Jan 5, 2015 · [<prev] [next>] [day] [month] [year] [list] Message-ID: <20150105051633.GA23009@openwall.com> Date: Mon, 5 Jan 2015 08:16:33 +0300 From: ...
  46. [46]
  47. [47]
  48. [48]
    Openwall GNU/*/Linux - DistroWatch.com
    May 17, 2025 · Openwall GNU/*/Linux (or Owl for short) is a small security-enhanced Linux distribution for servers, appliances, and virtual appliances.
  49. [49]
  50. [50]
    International Journal of Proof-of-Concept or Get The Fuck Out (PoC
    ... (PoC||GTFO or PoC or GTFO). 2013. PoC||GTFO 0x00, August 2013, An epistle from the desk of Rt. Revd. Pastor Manul Laphroaig; PoC||GTFO 0x01, October 2013, An ...
  51. [51]
    International Journal of PoC || GTFO issues
    Feb 6, 2024 · International Journal of PoC || GTFO issues. To comply with and support the samizdat license of PoC||GTFO, here are the journal issues so far.
  52. [52]
    angea/pocorgtfo: a "Proof of Concept or GTFO" mirror with ... - GitHub
    a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs. - angea/pocorgtfo.
  53. [53]
    [PDF] PoC||GTFO 15 - alchemistowl.org
    Jun 17, 2017 · Cracking a JKS with private key pass- word POC||GTFO on a single overclocked NVidia. GTX 1080 GPU is illustrated on Figure 15. Neighborly ...
  54. [54]
    [PDF] PoC||GTFO 15
    Cracking a JKS with private key pass- word POC||GTFO on a single overclocked NVidia. GTX 1080 GPU is illustrated on Figure 15. Neighborly Greetings.
  55. [55]
    PoC||GTFO: A Tourist's Phrasebook for Reversing Embedded ARM ...
    This article in PoC||GTFO is a “quick-start” style guide for reversing engineering embedded systems.
  56. [56]
    PoC||GTFO - No Starch Press
    30-day returnsAuthor Bio. Pastor Manul Laphroaig curates PoC||GTFO with a fine gang of friends and neighbors. Many of his essays are featured in the book, including "Epistle ...
  57. [57]
    oss-security Mailing List Charter
    Feb 28, 2024 · Anyone can send mail to the mailing list at oss [dash] security [at] lists [dot] openwall [dot] com, regardless of membership status. Non ...
  58. [58]
    oss-security mailing list - Openwall
    sys.org>); 2025/11/07 #1: Re: Becoming a CVE Naming Authority for your project (Peter Gutmann <pgut001@...auckland.20252022
  59. [59]
    Open Source Security Mailing List - Seclists.org
    SecLists.org archive for the Open Source Security mailing list: Discussion of security flaws, concepts, and practices in the Open Source community.
  60. [60]
    Reported Supply Chain Compromise Affecting XZ Utils Data ... - CISA
    Mar 29, 2024 · XZ Utils is data compression software and may be present in Linux distributions. The malicious code may allow unauthorized access to affected ...Missing: disclosure | Show results with:disclosure
  61. [61]
  62. [62]
    announce mailing list - Openwall
    2025/09/20 #1: [openwall-announce] "Linux Kernel Runtime Guard (LKRG) 1.0 ... 2018/05/24 #1: [openwall-announce] Owl update (Solar Designer <solar@...
  63. [63]
    OpenSSF Supports oss-security and (linux-)distros Mailing Lists
    Nov 14, 2023 · The oss-security and (linux)-distros mailing lists, which are operated by Openwall, have been a key part of the community's ability to ...
  64. [64]
  65. [65]
    vendors [OSS-Security] - Openwall
    Apr 10, 2025 · This page lists security contacts, bug tracker links, links to advisories, etc. for various open source-providing vendors.
  66. [66]
    Openwall's Summer of Security
    Openwall participated in Google Summer of Code (GSoC) in 2011, 2012, and 2013, and we worked with many great students under the GSoC program.