Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?
☆417Jun 23, 2021Updated 4 years ago
Alternatives and similar repositories for BEWGor
Users that are interested in BEWGor are comparing it to the libraries listed below
Sorting:
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,962Nov 17, 2025Updated 3 months ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,222Oct 4, 2023Updated 2 years ago
- Common User Passwords Profiler (CUPP)☆5,780Dec 26, 2025Updated 2 months ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- Create awesome wordlist with python, demo: https://asciinema.org/a/101677☆124Jun 12, 2019Updated 6 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆252Sep 27, 2023Updated 2 years ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆124Dec 21, 2023Updated 2 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,807Feb 23, 2026Updated last week
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,589Dec 5, 2024Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆228Sep 18, 2021Updated 4 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,292Jul 10, 2024Updated last year
- Windows passwords decryption from dump files☆511Feb 2, 2023Updated 3 years ago
- Generate customized Password/Passphrase wordlist based on target information☆97Feb 27, 2026Updated last week
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227May 8, 2018Updated 7 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,184Dec 11, 2022Updated 3 years ago
- Automatically brute force all services running on a target.☆2,224Aug 18, 2024Updated last year
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- Search for categorized domain☆454Jan 15, 2019Updated 7 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- A ton of helpful tools☆344Oct 8, 2021Updated 4 years ago
- Generate smart and powerful wordlists☆1,059Sep 7, 2024Updated last year
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159May 1, 2024Updated last year
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,227Nov 20, 2025Updated 3 months ago
- SMB Spider is a lightweight python utility for searching SMB/CIFS/Samba file shares. While performing a penetration test, the need to sea…☆135Dec 10, 2021Updated 4 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,213Aug 7, 2025Updated 7 months ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 5 years ago
- Wordlists are generated by permutations of a list of keywords. You can configure (connectors, abbreviations, reverse, replacements ...) t…☆38Nov 1, 2018Updated 7 years ago
- MSDAT: Microsoft SQL Database Attacking Tool☆984Aug 1, 2023Updated 2 years ago