sc0tfree / mentalist
Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat and John the Ripper.
☆1,813Updated last year
Related projects ⓘ
Alternatives and complementary repositories for mentalist
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,666Updated last week
- CeWL is a Custom Word List Generator☆2,001Updated 3 weeks ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,045Updated last week
- One rule to crack all passwords. or atleast we hope so.☆1,476Updated 2 years ago
- Find exploits in local and online databases instantly☆1,643Updated 3 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,678Updated last month
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,016Updated last month
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,222Updated last year
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,010Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆495Updated 7 months ago
- File upload vulnerability scanner and exploitation tool.☆3,053Updated last year
- A default credential scanner.☆1,452Updated 2 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,198Updated 2 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,008Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,737Updated 9 months ago
- Striker is an offensive information and vulnerability scanner.☆2,235Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,618Updated this week
- 🐧 Abuse of Google Colab for cracking hashes.☆925Updated last year
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,699Updated 2 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,530Updated last year
- All In One Web Recon☆2,295Updated 2 weeks ago
- Find web directories without bruteforce☆1,774Updated last year
- PACK (Password Analysis and Cracking Kit)☆800Updated 4 years ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,467Updated last year
- Reconnaissance Swiss Army Knife☆1,817Updated 3 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,111Updated last year
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,580Updated last month
- Automatically brute force all services running on a target.☆1,973Updated 3 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,450Updated last month
- offsec batteries included☆1,508Updated 8 months ago