sc0tfree / mentalistLinks
Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat and John the Ripper.
☆1,923Updated 2 years ago
Alternatives and similar repositories for mentalist
Users that are interested in mentalist are comparing it to the libraries listed below
Sorting:
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,764Updated 2 weeks ago
- One rule to crack all passwords. or atleast we hope so.☆1,575Updated 3 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,733Updated last year
- CeWL is a Custom Word List Generator☆2,415Updated this week
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,311Updated this week
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,360Updated 3 months ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆523Updated last year
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,172Updated 2 years ago
- Collection of some common wordlists such as RDP password, user name list, ssh password wordlist for brute force. IP Cameras Default Passw…☆1,675Updated 3 years ago
- Find exploits in local and online databases instantly☆1,775Updated 4 years ago
- Reconnaissance Swiss Army Knife☆1,968Updated 4 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,463Updated last year
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,066Updated 3 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,336Updated 6 months ago
- A default credential scanner.☆1,502Updated 3 months ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆645Updated 3 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,388Updated last year
- Software to identify the different types of hashes used to encrypt data and especially passwords☆615Updated last year
- Striker is an offensive information and vulnerability scanner.☆2,309Updated 2 years ago
- PACK (Password Analysis and Cracking Kit)☆858Updated 5 years ago
- A script that you can run in the background!☆2,916Updated last year
- Search for leaked credentials☆1,359Updated 4 years ago
- All In One Web Recon☆2,531Updated 5 months ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,067Updated last year
- Crack hashes in seconds.☆1,840Updated 10 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,278Updated 2 months ago
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,518Updated 6 years ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆415Updated 4 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,898Updated 3 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,751Updated last week