sc0tfree / mentalistLinks
Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat and John the Ripper.
☆1,930Updated 2 weeks ago
Alternatives and similar repositories for mentalist
Users that are interested in mentalist are comparing it to the libraries listed below
Sorting:
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,780Updated last month
- One rule to crack all passwords. or atleast we hope so.☆1,582Updated 3 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,737Updated last year
- CeWL is a Custom Word List Generator☆2,485Updated last month
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,334Updated 2 weeks ago
- Find exploits in local and online databases instantly☆1,783Updated 4 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆524Updated last year
- A default credential scanner.☆1,499Updated 4 months ago
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,068Updated 3 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆1,372Updated 4 months ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,179Updated 2 years ago
- PACK (Password Analysis and Cracking Kit)☆859Updated 5 years ago
- Search for leaked credentials☆1,368Updated 4 years ago
- Crack hashes in seconds.☆1,848Updated 11 months ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,470Updated last year
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆649Updated 3 years ago
- Reconnaissance Swiss Army Knife☆1,979Updated 4 years ago
- Striker is an offensive information and vulnerability scanner.☆2,316Updated 2 years ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,069Updated last year
- Software to identify the different types of hashes used to encrypt data and especially passwords☆621Updated last year
- Detect and decode encoded strings, recursively.☆909Updated 2 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,414Updated last year
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,728Updated last year
- All In One Web Recon☆2,555Updated 7 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,907Updated 3 years ago
- 🐧 Abuse of Google Colab for cracking hashes.☆963Updated 2 years ago
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆417Updated 4 years ago
- Infosec Wordlists and more.☆903Updated 5 months ago
- The Offensive Manual Web Application Penetration Testing Framework.☆1,841Updated 2 years ago
- Image Payload Creating/Injecting tools☆1,268Updated 2 years ago