Psudohash rapidly generates millions of keyword-based password mutations using customizable character substitutions, padding, and combination patterns to aid in brute force and password cracking attacks.
Generates millions of keyword-based password mutations in seconds.
This tool is primarily used by penetration testers and security professionals to create comprehensive password lists based on known keywords and common human password creation patterns. It helps simulate realistic password mutations for brute forcing or hash cracking in corporate environments where employees often use variations of company-related keywords.
Users should customize the character substitution mappings and padding values to better reflect the target environment's password policies. The tool requires Python 3.x and the tqdm package. It is intended for ethical use in penetration testing and security assessments only.
Install Python 3.x
Install tqdm Python package with: pip3 install tqdm
Clone the repository from GitHub
-i / --inorder
Join keywords only in their original order to generate mutations
-c / --combinations
Generate every ordering of each subset of keywords
--sep <string>
Insert a custom separator string between joined keywords
--max-combine <N>
Limit how many raw keywords get joined together (default is 2)
--minlen <N> / --maxlen <N>
Filter the final wordlist to only include passwords within the specified length range
-cpb / -cpa
Append common padding values before (-cpb) or after (-cpa) each generated keyword variation
-y <year>
Append year values to mutated keywords using various separators