Update README.md
This commit is contained in:
parent
1e1a6d1c94
commit
45c5f9d05d
@ -4,7 +4,8 @@
|
||||
<img src="https://img.shields.io/badge/Developed%20on-kali%20linux-blueviolet">
|
||||
|
||||
## Purpose
|
||||
psudohash is a password list generator for orchestrating brute force attacks. It imitates certain password creation patterns commonly used by humans, like substituting a word's letters with symbols or numbers, using char-case variations, adding a common padding before or after the word and more. It is keyword-based and highly customizable. Explicitly developed and tested on kali linux.
|
||||
Psudohash is a password list generator for orchestrating brute force attacks and cracking hashes. It imitates certain password creation patterns commonly used by humans, like substituting a word's letters with symbols or numbers (leet), using char-case variations, adding a common padding before or after the main passphrase and more. It is keyword-based and highly customizable.
|
||||
⚠️Explicitly developed and tested on **kali linux**.
|
||||
|
||||
### Pentesting Corporate Environments
|
||||
System administrators and other employees often use a mutated version of the Company's name to set passwords (e.g. Am@z0n_2022). This is commonly the case for network devices (Wi-Fi access points, switches, routers, etc), application or even domain accounts. With the most basic options, psudohash can generate a wordlist with all possible mutations of one or multiple keywords, based on common character substitution patterns (customizable), case variations, strings commonly used as padding and more. Take a look at the following example:
|
||||
|
Loading…
x
Reference in New Issue
Block a user