Using personal details as passwords? It's like giving hackers a free pass. Easy targets, easy access. It's practically an open invitation for a security disaster.
PassLord is a powerful, profile-based wordlist generator designed for security professionals and ethical hackers. It creates highly customized password lists by intelligently combining personal information with common patterns, character transformations, and a flexible rule engine.
✔ Dual Modes: Run in Simple Mode for quick, default wordlists, or use Advanced Mode for deep, interactive customization.
✔ Effortless Password Generation: PassLord effortlessly generates 50+ lakh unique passwords with minimal input, allowing users to include personal details and customize password rules.
✔ Tailored Security: Users can input a wide range of personal information into PassLord, creating highly personalized password lists
✔ Comprehensive Coverage: PassLord utilizes minimal data like names and birthdates to generate a vast array of lakh of passwords, providing thorough security against potential attackers.
| Requirements | Configuration |
|---|---|
| Linux with python installed | All of the modules used in this tool are part of the Python Standard Library. They come bundled with Python itself, so there's no need to install them separately. |
-
Installation:
# install via pip: pip install passlord -
Usage :
passlord
-
Installation :
# Clone the Passlord repository: git clone https://github.com/navnee1h/passlord.git cd passlord
- Simple Mode :
Run the script without any flags to generate a wordlist using the default settings.
python passlord.py
- Advanced Mode :
Activate the interactive setup menu for full customization using the
-Aor--advancedflag. This will allow you to configure password length, transformations, and more.python passlord.py -A
[01] First name
[02] Middle name
[03] Last name
[04] Nick name
[05] Date of birth
[06] Phone number
[07] Girl friend
[08] House name
[09] Company name
[10] Pets name
[11] Other nameThe power of PassLord comes from the patterns/rules.txt file. Each line in this file is a rule that tells the script how to combine the keywords you provide.
- Location: The script expects to find this file at
patterns/rules.txt. - Syntax: Keywords are separated by the
@symbol.
Example Rules:
fname@dyear #Simple combination of first name and a year
nname@symbols@rnum2 #Complex combination with symbols and numbers
This tool is currently in development. If you encounter any issues, we encourage you to report them to our Telegram Group. Your feedback is invaluable and will help us enhance the tool's capabilities. Thank you for helping us improve!
The password generation tool utilizes arrays as its primary mechanism. Initially, users are prompted to input their personal details, which are then transformed into uppercase, lowercase, title case, and other formats as per the specified rules. These transformed details are then stored in arrays for further processing. Additionally, the program reads from the 'rules.txt' file, which contains patterns guiding the password generation process.
I'm Navaneeth, the creator of Passlord. I'm passionate about advancing cybersecurity, and Passlord is a testament to that passion. Connect with me on LinkedIn.
Passlord is licensed under the MIT license. See LICENSE for more information.
I want to emphasize that I am not liable and hereby disclaim any responsibility for any misuse of the 'passlord' tool. Users are solely responsible for their actions when utilizing this tool. Your understanding is appreciated.
