Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?
☆419Jun 23, 2021Updated 4 years ago
Alternatives and similar repositories for BEWGor
Users that are interested in BEWGor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,984Apr 14, 2026Updated last month
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,259Oct 4, 2023Updated 2 years ago
- Common User Passwords Profiler (CUPP)☆5,914Dec 26, 2025Updated 4 months ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆124Dec 21, 2023Updated 2 years ago
- Generate customized Password/Passphrase wordlist based on target information☆104Feb 27, 2026Updated 2 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Create awesome wordlist with python, demo: https://asciinema.org/a/101677☆128Jun 12, 2019Updated 6 years ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)☆970Nov 4, 2025Updated 6 months ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,625Dec 5, 2024Updated last year
- Wordlists are generated by permutations of a list of keywords. You can configure (connectors, abbreviations, reverse, replacements ...) t…☆38Nov 1, 2018Updated 7 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Generate smart and powerful wordlists☆1,102Sep 7, 2024Updated last year
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆229Sep 18, 2021Updated 4 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,828May 5, 2026Updated 2 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆253Sep 27, 2023Updated 2 years ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- Automatically brute force all services running on a target.☆2,261Aug 18, 2024Updated last year
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 6 years ago
- PACK (Password Analysis and Cracking Kit)☆877Dec 10, 2019Updated 6 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 5 months ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,308Jul 10, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Github organization reconnaissance tool.☆219May 22, 2023Updated 2 years ago
- a CLI for ephemeral penetration testing☆17Dec 10, 2019Updated 6 years ago
- A framework for wireless pentesting.☆1,236Oct 14, 2020Updated 5 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 6 years ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆374Apr 27, 2023Updated 3 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Feb 12, 2019Updated 7 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆661Jan 6, 2022Updated 4 years ago
- Handshake cracker☆52May 6, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- 密码生成 flexible and scriptable password dictionary generator which can support brute-force、combination、complex rule mode etc...☆169Jun 11, 2025Updated 11 months ago
- Windows passwords decryption from dump files☆515Feb 2, 2023Updated 3 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 9 years ago
- This repository contains payload to test NoSQL Injections☆374May 5, 2021Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,284Nov 20, 2025Updated 6 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,976Mar 22, 2024Updated 2 years ago