pydictor: A powerful and useful hacker dictionary builder for a brute-force attack




A powerful and useful hacker dictionary builder for a brute-force attack

Preface:

You can use pydictor to generate a general blast wordlist, a custom wordlist based on Web content, a social engineering wordlist, and so on;
      You can use the pydictor built-in tool to safe delete, merge, unique, merge and unique,  count word frequency to filter the wordlist, 
      besides, you also can specify your wordlist and use '-tool handler' to filter your wordlist;

Start:

git clone --depth=1 --branch=master https://www.github.com/landgrey/pydictor.git
cd pydictor/
chmod 755 pydictor.py
python pydictor.py

types of generate wordlist(14 types)and descriptions

wordlist typenumberdescription
base1basic wordlist
char2custom character wordlist
chunk3permutation and combination wordlist
conf4based on configuration file wordlist
sedb5social engineering wordlist
idcard6id card last 6/8 char wordlist
extend7extend wordlist based on rules
scratch8wordlist based on web pages keywords
passcraper9wordlist against to web admin and users
handler10handle the input file generate wordlist
uniqifer11unique the input file and generate wordlist
counter12word frequency count wordlist
combiner13combine the input file generate wordlist
uniqbiner14combine and unique the input file generate wordlist

function and scope of support wordlist number

functionnumber (wordlist)description
len1 2 3 4 5 6 7 9 10 11 12 14lenght scope
head1 2 3 4 5 6 7 9 10 11 12 14add items prefix
tail1 2 3 4 5 6 7 9 10 11 12 14add items suffix
encode1 2 3 4 5 6 7 9 10 11 12 14encode the items
occur3 4 5 7 9 10 11 12 14filter by occur times of letter、digital、special chars
types3 4 5 7 9 10 11 12 14filter by types of letter、digital、special chars
regex3 4 5 7 9 10 11 12 14filter by regex
level5 7 9set the wordlist level
leet5 7 91337 mode


DOWNLOAD


Comments

Popular posts from this blog

USB forensic : Find the history of every connected USB device on your computer

Crawling pastebin to find specific pastedump

Hack WinRAR password by using Brute force attack

Fileless malware Analysis with Cuckoo sandbox

Web application penetration testing: Tools and Techniques for web security auditing