Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat and John the Ripper.
☆1,962Nov 17, 2025Updated 3 months ago
Alternatives and similar repositories for mentalist
Users that are interested in mentalist are comparing it to the libraries listed below
Sorting:
- Common User Passwords Profiler (CUPP)☆5,780Dec 26, 2025Updated 2 months ago
- RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.☆231Jul 24, 2019Updated 6 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,808Updated this week
- A swiss army knife for pentesting networks☆9,086Dec 6, 2023Updated 2 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,556Oct 17, 2022Updated 3 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆531Apr 17, 2024Updated last year
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,222Oct 4, 2023Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,592Feb 20, 2026Updated 2 weeks ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,655Jan 5, 2026Updated 2 months ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆417Jun 23, 2021Updated 4 years ago
- SMBMap is a handy SMB enumeration tool☆2,021Jan 6, 2026Updated 2 months ago
- A Tool for Domain Flyovers☆5,904May 22, 2022Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,213Aug 7, 2025Updated 7 months ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,916Nov 19, 2025Updated 3 months ago
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)☆965Nov 4, 2025Updated 4 months ago
- Domain Password Audit Tool for Pentesters☆1,024Dec 24, 2025Updated 2 months ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,405Jul 13, 2025Updated 7 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,377Mar 2, 2026Updated last week
- Automation for internal Windows Penetrationtest / AD-Security☆3,645Aug 28, 2025Updated 6 months ago
- A Python based ingestor for BloodHound☆2,352Oct 24, 2025Updated 4 months ago
- JAWS - Just Another Windows (Enum) Script☆1,927Apr 19, 2021Updated 4 years ago
- Username tools for penetration testing☆1,334Sep 20, 2024Updated last year
- Attack Surface Management Platform☆9,435Feb 15, 2026Updated 3 weeks ago
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,659Nov 28, 2020Updated 5 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,992Oct 10, 2018Updated 7 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,361Jan 26, 2026Updated last month
- One rule to crack all passwords. or atleast we hope so.☆1,608Dec 9, 2021Updated 4 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,901Jan 24, 2024Updated 2 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,268Feb 20, 2026Updated 2 weeks ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,379May 22, 2020Updated 5 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,311Nov 22, 2022Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,437Mar 2, 2026Updated last week
- Trying to tame the three-headed dog.☆4,913Nov 14, 2025Updated 3 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,468Sep 22, 2024Updated last year
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Mimikatz implementation in pure Python☆3,251Jan 2, 2026Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,515Updated this week
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,590Dec 5, 2024Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,625Jul 18, 2024Updated last year