Bruteforcing
Password Identification
# Identify hash type
hash-identifier
# Name That Hash (better)
# https://github.com/HashPals/Name-That-Hash
nth --text "5f4dcc3b5aa765d61d8327deb882cf99"
# hashid
hashid -m '$2a$10$...' # Shows hashcat modeWordlist Generation
# CeWL - Generate wordlist from target website
cewl https://target.com -d 3 -m 5 -w custom_wordlist.txt
cewl https://target.com --with-numbers -d 3 -w wordlist.txt
# Generate password variations
# https://github.com/edoardottt/longtongue
python3 longtongue.py -w base_words.txt -o passwords.txt
# Username wordlist from names
# https://github.com/AhmedMohamedDev/namemash.py
python namemash.py names.txt > usernames.txtHTTP Bruteforcing
Hydra
ffuf
Patator
Service Bruteforcing
SSH
RDP
FTP
SMB
Database Services
Other Services
Evasion Techniques
Password Spraying
Default Credentials
Wordlists
Related Topics
Last updated
Was this helpful?