sc0tfree / mentalistLinks
Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat and John the Ripper.
☆1,879Updated 2 years ago
Alternatives and similar repositories for mentalist
Users that are interested in mentalist are comparing it to the libraries listed below
Sorting:
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,742Updated 4 months ago
- CeWL is a Custom Word List Generator☆2,262Updated 7 months ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,712Updated 8 months ago
- One rule to crack all passwords. or atleast we hope so.☆1,539Updated 3 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,260Updated last week
- Common User Passwords Profiler (CUPP)☆4,838Updated last year
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,316Updated 2 months ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆514Updated last year
- Reconnaissance Swiss Army Knife☆1,923Updated 4 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,320Updated 9 months ago
- Find exploits in local and online databases instantly☆1,739Updated 3 years ago
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,049Updated 3 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,160Updated 2 years ago
- An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S0…☆847Updated 8 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,151Updated last month
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,667Updated this week
- Veil 3.1.X (Check version info in Veil at runtime)☆4,119Updated last year
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,330Updated 8 months ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆607Updated last year
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,297Updated 2 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,829Updated 3 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,843Updated last year
- Crack hashes in seconds.☆1,821Updated 6 months ago
- PACK (Password Analysis and Cracking Kit)☆847Updated 5 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,330Updated 2 weeks ago
- pwning IPv4 via IPv6☆1,807Updated last year
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,521Updated last year
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,444Updated last year
- Username tools for penetration testing☆1,074Updated 9 months ago
- Email recon made fast and easy, with a framework to build on☆957Updated 2 years ago