sc0tfree / mentalistLinks
Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat and John the Ripper.
☆1,872Updated 2 years ago
Alternatives and similar repositories for mentalist
Users that are interested in mentalist are comparing it to the libraries listed below
Sorting:
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,739Updated 4 months ago
- CeWL is a Custom Word List Generator☆2,237Updated 7 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,251Updated 3 weeks ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,711Updated 7 months ago
- One rule to crack all passwords. or atleast we hope so.☆1,538Updated 3 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,315Updated 8 months ago
- Common User Passwords Profiler (CUPP)☆4,806Updated last year
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,313Updated last month
- Striker is an offensive information and vulnerability scanner.☆2,285Updated last year
- Find exploits in local and online databases instantly☆1,738Updated 3 years ago
- Reconnaissance Swiss Army Knife☆1,914Updated 4 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,113Updated last week
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,834Updated last year
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,158Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆511Updated last year
- A default credential scanner.☆1,482Updated 3 years ago
- All In One Web Recon☆2,454Updated last month
- Collection of some common wordlists such as RDP password, user name list, ssh password wordlist for brute force. IP Cameras Default Passw…☆1,621Updated 2 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,651Updated last week
- Metadata harvester☆1,112Updated last year
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,518Updated last year
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,818Updated 3 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,467Updated 9 months ago
- Phishing Campaign Toolkit☆2,397Updated 10 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,106Updated last year
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,362Updated 5 years ago
- Subdomain enumeration and information gathering tool☆1,302Updated last month
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,444Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,208Updated 3 weeks ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,309Updated 7 months ago