Overview
Wordlist generators create custom dictionaries for password cracking, brute-force attacks, and security testing. These tools help security professionals test password strength by generating targeted wordlists based on personal information, patterns, or comprehensive character combinations.Use Cases
- Password Auditing: Test organizational password policies
- Penetration Testing: Create targeted wordlists for specific targets
- Security Research: Analyze password patterns and weaknesses
- Social Engineering Assessments: Generate personalized password lists
- Credential Testing: Verify password strength requirements
Available Tools
CUPP
Common User Passwords Profiler - personalized wordlists
WordlistCreator
Generate all password combinations by pattern
Goblin WordGenerator
Advanced wordlist generation tool
SMWYG
Search 1.4 billion leaked passwords
CUPP - Common User Passwords Profiler
Description
CUPP generates personalized wordlists based on target information. It’s particularly effective for social engineering assessments, as people often use personal information in their passwords (names, birthdays, pet names, etc.).Installation
Usage
Interactive Mode Example
CUPP will ask questions about your target:- john1990
- Smith2015
- JohnnySarah
- emmamax
- techcorp15
- And thousands more variations
Advanced Options
CUPP Configuration
CUPP Configuration
Edit
cupp.cfg to customize:- Years range
- Special characters to append
- Leet speak substitutions
- Common patterns
Output Size: CUPP can generate very large wordlists (millions of entries). Consider filtering or limiting combinations for practical use.
WordlistCreator (wlcreator)
Description
WlCreator is a C program that generates all possible password combinations based on specified parameters. You can customize the character set (lowercase, uppercase, numbers, special characters) and length.Installation
Compilation and Usage
Interactive Configuration
When you run wlcreator, it prompts for:Usage Examples
Performance Considerations
Goblin WordGenerator
Description
Goblin WordGenerator creates custom wordlists with various generation modes and patterns.Installation
Running
Features
- Multiple generation algorithms
- Custom pattern support
- Combination generation
- Rules-based wordlist creation
- Leet speak transformations
SMWYG - Show Me What You Got
Description
This tool allows you to search through 1.4 billion clear text passwords from the BreachCompilation database leak. It’s invaluable for OSINT and checking if specific credentials have been compromised.Installation
Running
Features
- Search 1.4 billion passwords
- Email-based credential lookup
- Domain-based searches
- Password pattern analysis
- Export results
Use Cases
OSINT and Credential Analysis
OSINT and Credential Analysis
Organization Assessment
- Check if employee emails have been compromised
- Identify leaked credentials for your domain
- Analyze password patterns in breaches
- Verify if credentials are publicly available
- Build target-specific wordlists from leaks
- Identify credential reuse patterns
- Demonstrate breach impact to stakeholders
- Show real compromised passwords
- Educate users about password security
Best Practices
Wordlist Strategy
-
Start Small, Scale Up
-
Use Rules Instead of Large Wordlists
-
Combine Multiple Sources
Optimization
Integration with Cracking Tools
Hashcat
Hashcat
John the Ripper
John the Ripper
Hydra (Network Services)
Hydra (Network Services)
Popular Wordlist Resources
Pre-built Wordlists
| Wordlist | Size | Description |
|---|---|---|
| rockyou.txt | 139M | Most popular, from 2009 breach |
| crackstation.txt | 15GB | Massive comprehensive list |
| SecLists | Varies | Curated collection of lists |
| weakpass.com | Various | Leaked password databases |
Download Commands
Advanced Techniques
Targeted Wordlist Generation
Password Mutation
Responsible Use: Always document wordlist generation in your penetration testing reports. Explain your methodology and justify the approach taken.
Troubleshooting
Wordlist Too Large
Wordlist Too Large
Solutions:
- Filter by length:
awk 'length>=8 && length<=14' - Sample random entries:
shuf -n 100000 large.txt > sample.txt - Split into chunks:
split -l 1000000 large.txt chunk_ - Use rules instead of larger wordlist
Out of Memory
Out of Memory
Solutions:
- Process in smaller batches
- Use streaming instead of loading entire file
- Increase swap space
- Use tools with lower memory footprint
Character Encoding Issues
Character Encoding Issues
Solutions: