Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?
☆420Jun 23, 2021Updated 4 years ago
Alternatives and similar repositories for BEWGor
Users that are interested in BEWGor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,971Apr 14, 2026Updated last week
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,243Oct 4, 2023Updated 2 years ago
- Common User Passwords Profiler (CUPP)☆5,871Dec 26, 2025Updated 3 months ago
- A simple wordlists generator and mangler written in Python 3.10.1.☆124Dec 21, 2023Updated 2 years ago
- Generate customized Password/Passphrase wordlist based on target information☆102Feb 27, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Create awesome wordlist with python, demo: https://asciinema.org/a/101677☆128Jun 12, 2019Updated 6 years ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)☆967Nov 4, 2025Updated 5 months ago
- A web front-end for password cracking and analytics☆621Dec 15, 2021Updated 4 years ago
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,594Dec 5, 2024Updated last year
- Wordlists are generated by permutations of a list of keywords. You can configure (connectors, abbreviations, reverse, replacements ...) t…☆38Nov 1, 2018Updated 7 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Generate smart and powerful wordlists☆1,075Sep 7, 2024Updated last year
- 🔓 A dynamic dictionary merger for successful dictionary based attacks.☆229Sep 18, 2021Updated 4 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,821Apr 13, 2026Updated last week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆253Sep 27, 2023Updated 2 years ago
- Query and report user logons relations from MS Windows Security Events☆244Aug 9, 2018Updated 7 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 6 years ago
- Automatically brute force all services running on a target.☆2,241Aug 18, 2024Updated last year
- PACK (Password Analysis and Cracking Kit)☆873Dec 10, 2019Updated 6 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 4 months ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,298Jul 10, 2024Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Github organization reconnaissance tool.☆219May 22, 2023Updated 2 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- A framework for wireless pentesting.☆1,234Oct 14, 2020Updated 5 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆660Jan 6, 2022Updated 4 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Feb 12, 2019Updated 7 years ago
- Handshake cracker☆53May 6, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 密码生成 flexible and scriptable password dictionary generator which can support brute-force、combination、complex rule mode etc...☆168Jun 11, 2025Updated 10 months ago
- Windows passwords decryption from dump files☆514Feb 2, 2023Updated 3 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- This repository contains payload to test NoSQL Injections☆374May 5, 2021Updated 4 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆444Jul 11, 2017Updated 8 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,271Nov 20, 2025Updated 5 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,968Mar 22, 2024Updated 2 years ago