密码生成 flexible and scriptable password dictionary generator which can support brute-force、combination、complex rule mode etc...
☆169Jun 11, 2025Updated 10 months ago
Alternatives and similar repositories for TTPassGen
Users that are interested in TTPassGen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A very flexible phone number wordlist generator☆72Jun 21, 2024Updated last year
- Generate word list by combining inputted words or by permutaing characters.☆14Nov 24, 2017Updated 8 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆100Feb 24, 2024Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆532Apr 17, 2024Updated last year
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,970Mar 30, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CeWL is a Custom Word List Generator☆2,633Apr 4, 2026Updated last week
- Create wordlists from source codes files/directories for enumeration☆30Jul 18, 2023Updated 2 years ago
- Create awesome wordlist with python, demo: https://asciinema.org/a/101677☆127Jun 12, 2019Updated 6 years ago
- Bruteforce Dictionary Generator☆14Apr 3, 2022Updated 4 years ago
- It's a tool which generate a dictionary from a csv containing personals informations. Generate all common passwords based on perso info.…☆57Oct 1, 2020Updated 5 years ago
- Brutal Wordlist Generator is a java based Application software used to generate the wordlist with best of UX interface☆26Oct 31, 2017Updated 8 years ago
- Hash type identifier (CLI & lib)☆965Updated this week
- Python version of the OMEN password cracker☆17Dec 17, 2024Updated last year
- Mnemonic Cryptography☆18Nov 11, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Bull's Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?☆419Jun 23, 2021Updated 4 years ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 4 months ago
- Showcase of DNS Exfiltration and Infiltration☆60Feb 26, 2021Updated 5 years ago
- Handshake cracker☆53May 6, 2023Updated 2 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- Adversary Simulation Framework☆39Aug 19, 2025Updated 7 months ago
- Detect & filter duplicate hashcat rules☆48Jan 14, 2025Updated last year
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 12 years ago
- Scripts, tools and drivers for wardriving under Mac OSX☆14Dec 7, 2016Updated 9 years ago
- Simple WordList Generator (GUI)☆13Jan 13, 2020Updated 6 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,593Dec 5, 2024Updated last year
- Rust binding for Keystone assembler framework☆11Dec 9, 2018Updated 7 years ago
- ☆19Jul 23, 2021Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆770Apr 5, 2020Updated 6 years ago
- ATT&CK Models of the Threat Actor "Phineas Fisher"☆18Apr 30, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Custom password cracking rules for Hashcat and John the Ripper☆94Aug 19, 2024Updated last year
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Small utilities that are useful in advanced password cracking☆1,562Nov 8, 2025Updated 5 months ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- In-depth Attack Surface Mapping and Asset Discovery☆27Aug 24, 2020Updated 5 years ago
- Generate users list using certain format☆23Jan 23, 2019Updated 7 years ago
- Simple, production ready, HTTP server for static file serving☆12Apr 1, 2023Updated 3 years ago