sc0tfree / mentalistLinks
Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat and John the Ripper.
☆1,890Updated 2 years ago
Alternatives and similar repositories for mentalist
Users that are interested in mentalist are comparing it to the libraries listed below
Sorting:
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,749Updated 6 months ago
- One rule to crack all passwords. or atleast we hope so.☆1,553Updated 3 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,720Updated 9 months ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,326Updated 3 weeks ago
- CeWL is a Custom Word List Generator☆2,302Updated 9 months ago
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,055Updated 3 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,275Updated last week
- Fetch, install and search wordlist archives from websites and torrent peers.☆515Updated last year
- Find exploits in local and online databases instantly☆1,747Updated 3 years ago
- PACK (Password Analysis and Cracking Kit)☆851Updated 5 years ago
- Reconnaissance Swiss Army Knife☆1,934Updated 4 years ago
- Crack hashes in seconds.☆1,831Updated 7 months ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,448Updated last year
- Striker is an offensive information and vulnerability scanner.☆2,295Updated 2 years ago
- Detect and decode encoded strings, recursively.☆902Updated 2 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,166Updated 2 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆611Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,334Updated 10 months ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆637Updated 2 years ago
- Image Payload Creating/Injecting tools☆1,249Updated last year
- A default credential scanner.☆1,493Updated 3 weeks ago
- An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S0…☆859Updated 9 months ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,706Updated this week
- Search for leaked credentials☆1,346Updated 4 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,875Updated 2 years ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,061Updated last year
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,308Updated 3 months ago
- Hashcat Cheatsheet for OSCP☆617Updated 5 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,614Updated 4 years ago
- Collection of some common wordlists such as RDP password, user name list, ssh password wordlist for brute force. IP Cameras Default Passw…☆1,644Updated 2 years ago