sc0tfree / mentalistView external linksLinks
Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat and John the Ripper.
☆1,952Nov 17, 2025Updated 2 months ago
Alternatives and similar repositories for mentalist
Users that are interested in mentalist are comparing it to the libraries listed below
Sorting:
- Common User Passwords Profiler (CUPP)☆5,749Dec 26, 2025Updated last month
- RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.☆231Jul 24, 2019Updated 6 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,799Updated this week
- A swiss army knife for pentesting networks☆9,056Dec 6, 2023Updated 2 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,551Oct 17, 2022Updated 3 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆533Apr 17, 2024Updated last year
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,201Oct 4, 2023Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,564Oct 21, 2025Updated 3 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,638Jan 5, 2026Updated last month
- SMBMap is a handy SMB enumeration tool☆2,015Jan 6, 2026Updated last month
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆418Jun 23, 2021Updated 4 years ago
- A Tool for Domain Flyovers☆5,897May 22, 2022Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,206Aug 7, 2025Updated 6 months ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,903Nov 19, 2025Updated 2 months ago
- Domain Password Audit Tool for Pentesters☆1,023Dec 24, 2025Updated last month
- Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)☆966Nov 4, 2025Updated 3 months ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,403Jul 13, 2025Updated 7 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,363Feb 2, 2026Updated 2 weeks ago
- A Python based ingestor for BloodHound☆2,335Oct 24, 2025Updated 3 months ago
- Username tools for penetration testing☆1,308Sep 20, 2024Updated last year
- JAWS - Just Another Windows (Enum) Script☆1,915Apr 19, 2021Updated 4 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,639Aug 28, 2025Updated 5 months ago
- Attack Surface Management Platform☆9,386Jan 12, 2026Updated last month
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,657Nov 28, 2020Updated 5 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,987Oct 10, 2018Updated 7 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,319Jan 26, 2026Updated 2 weeks ago
- One rule to crack all passwords. or atleast we hope so.☆1,598Dec 9, 2021Updated 4 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,899Jan 24, 2024Updated 2 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,383May 22, 2020Updated 5 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,244Jan 9, 2026Updated last month
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,308Nov 22, 2022Updated 3 years ago
- Trying to tame the three-headed dog.☆4,869Nov 14, 2025Updated 3 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,416Jan 13, 2026Updated last month
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,457Sep 22, 2024Updated last year
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Mimikatz implementation in pure Python☆3,239Jan 2, 2026Updated last month
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,606Jul 18, 2024Updated last year
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,585Dec 5, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆15,448Updated this week