sc0tfree / mentalistLinks
Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat and John the Ripper.
☆1,937Updated 2 months ago
Alternatives and similar repositories for mentalist
Users that are interested in mentalist are comparing it to the libraries listed below
Sorting:
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,786Updated 3 months ago
- One rule to crack all passwords. or atleast we hope so.☆1,591Updated 4 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,744Updated last month
- CeWL is a Custom Word List Generator☆2,531Updated 2 months ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,392Updated 6 months ago
- PACK (Password Analysis and Cracking Kit)☆865Updated 6 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆530Updated last year
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,180Updated 3 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,351Updated this week
- Detect and decode encoded strings, recursively.☆917Updated 4 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,390Updated this week
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,073Updated 3 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,919Updated 3 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,483Updated 2 years ago
- Search for leaked credentials☆1,372Updated 4 years ago
- A default credential scanner.☆1,500Updated 6 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,431Updated last year
- Striker is an offensive information and vulnerability scanner.☆2,311Updated 2 years ago
- Find exploits in local and online databases instantly☆1,799Updated 4 years ago
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,526Updated 6 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,359Updated 8 months ago
- Crack hashes in seconds.☆1,851Updated last year
- Software to identify the different types of hashes used to encrypt data and especially passwords☆626Updated last year
- Collection of some common wordlists such as RDP password, user name list, ssh password wordlist for brute force. IP Cameras Default Passw…☆1,707Updated 3 years ago
- 🐧 Abuse of Google Colab for cracking hashes.☆964Updated 2 years ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆418Updated 4 years ago
- Find web directories without bruteforce☆1,953Updated 2 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,381Updated 5 years ago
- Infosec Wordlists and more.☆914Updated 6 months ago
- An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S0…☆910Updated last year