Skip to main content

WordList For Hacking — Unified wordlist generation toolkit for pentest and red team operations

Project description

WordListsForHacking (WFH)

GitHub Stars License Version Python 3.8+ PyPI

Unified wordlist generation toolkit for pentest and red team operations. Combines charset generation, target profiling, web scraping (with JS/CSS/PDF extraction), OCR extraction, leet speak, DNS fuzzing, phone number generation, corporate user enumeration, default credential databases, ISP keyspace generation, ML-based ranking with SecLists corpus training, and statistical analysis — all in a single CLI tool.

Full documentation: Wiki


DISCLAIMER: This tool is intended exclusively for authorized security testing, penetration testing, and educational purposes. Unauthorized use against systems you do not own or have explicit written permission to test is illegal and unethical. The author assumes no liability for misuse.


Quick Start

Install via pip (recommended)

pip install wfh-wordlist            # core
pip install wfh-wordlist[full]      # all extras (OCR, document parsing)

Or clone from source

git clone https://github.com/mrhenrike/WordListsForHacking.git
cd WordListsForHacking

# Linux / macOS / Termux
chmod +x setup_venv.sh && ./setup_venv.sh && source .venv/bin/activate

# Windows PowerShell
.\setup_venv.ps1; .\.venv\Scripts\Activate.ps1

Run

wfh                        # interactive menu (pip install)
python wfh.py              # interactive menu (from source)
python wfh.py --help       # full CLI help

OS prerequisites (OCR only): see the Installation wiki page.


Subcommands

# Command Description
1 charset Charset/mask generation (crunch-style + hashcat masks)
2 pattern Template-based generation with variables
3 profile Personal target profiling (CUPP-style)
4 corp Corporate target profiling
5 corp-users Corporate domain user/password generation (50+ patterns)
6 phone Phone number wordlists (BR, US, UK)
7 scrape Web scraping (CeWL/CeWLeR-style) with JS/CSS/PDF extraction
8 ocr OCR text extraction from images
9 extract Extract words from PDF/XLSX/DOCX
10 leet Leet speak permutations
11 xor XOR encrypt/decrypt/brute-force
12 analyze Statistical analysis (pipal-style)
13 merge Merge & deduplicate wordlists
14 dns DNS/subdomain fuzzing (alterx-style)
15 pharma Healthcare/pharmacy credential patterns
16 sanitize Clean & normalize wordlists
17 reverse Reverse line order
18 corp-prefixes Corporate prefix usernames (MSP/SOC/DevOps)
19 train Train ML pattern model (local + SecLists corpus)
20 sysinfo Hardware & compute info
21 mangle Word mangling rules
22 default-creds Query default credentials database (IoT/routers/printers/ICS)
23 isp-keygen ISP default WiFi password keyspace generator
24 combiner Keyword combiner (intelligence-wordlist-generator style)

Detailed syntax and examples for each subcommand: Wiki — Subcommands

Global Flags

python wfh.py --threads 20 --compute cuda --no-ml <subcommand>
Flag Default Description
--threads N 5 Thread count (1–300)
--compute MODE auto auto / cpu / gpu / cuda / rocm / mps / hybrid
--no-ml off Disable ML ranking
-v off Verbose logging

Common Usage Examples

Corporate pentest — generate users + passwords

python wfh.py corp-users --domain acme.com.br --file employees.txt --passwords --combo -o acme_combo.lst

Personal target profiling

python wfh.py profile --name "João Silva" --nick joao --birth 15/03/1990 --leet aggressive -o target.lst

Charset with hashcat mask

python wfh.py charset 8 8 --mask "?u?l?l?l?d?d?d?s" -o passwords.lst

Template-based patterns

python wfh.py pattern -t "{company}{year}!" --vars company=acme,globex year=2020-2026 -o patterns.lst

DNS subdomain fuzzing

python wfh.py dns -d acme.com.br --words dev staging api admin portal -o subdomains.lst

Analyze an existing wordlist

python wfh.py analyze passwords.lst --top 30 --masks --format json -o analysis.json

Default credentials lookup

python wfh.py default-creds --list-vendors
python wfh.py default-creds --vendor mikrotik --format combo -o mikrotik_creds.lst
python wfh.py default-creds --protocol snmp --format user -o snmp_users.lst

ISP WiFi keyspace generation

python wfh.py isp-keygen --list
python wfh.py isp-keygen --isp xfinity_comcast --estimate
python wfh.py isp-keygen --isp xfinity_comcast --limit 100000 -o xfinity.lst

Web scraping with JS/CSS/PDF

python wfh.py scrape https://target.com --include-js --include-css --include-pdf --lowercase -o words.lst
python wfh.py scrape https://target.com --emails --output-emails emails.txt --output-urls urls.txt
python wfh.py scrape https://target.com --subdomain-strategy children --stream -o stream.lst

Merge & sanitize

python wfh.py merge list1.lst list2.lst --min-len 6 --sort -o merged.lst
python wfh.py sanitize merged.lst --inplace

More examples and scenarios: Wiki — Quick Start


Wordlists

File Description Entries
passwords/wlist_brasil.lst Brazilian password corpus — cultural word banks, corporate patterns, leet speak, keyboard walks. Company names and CNPJs are public OSINT data. ~3.88M
passwords/default-creds-combo.lst Default credential user:password combos (routers, printers, ICS/SCADA) ~3K
data/default_credentials.json Structured default credentials database (1,329 entries, 88 vendors, 14 protocols)
fuzzing/discovery_br.lst Brazilian web discovery & API fuzzing paths ~900
usernames/username_br.lst Brazilian + global username patterns ~1.6K
labs/*.lst Workshop & training wordlists

Details: Wiki — Brazilian Wordlist


Is My Password in This List?

# Linux/macOS
grep -qxF 'YourPassword' passwords/wlist_brasil.lst && echo "FOUND!" || echo "Not found"

# Windows PowerShell
Select-String -Path passwords\wlist_brasil.lst -Pattern '^YourPassword$' -SimpleMatch -Quiet

If found: change it immediately, enable MFA/2FA, use a password manager, and never reuse passwords.

Full guide: Wiki — Password Check


ML Model

WFH includes a lightweight ML model that ranks generated candidates by structural pattern probability. Train it with local data or the SecLists corpus:

python wfh.py train --auto                    # local wordlists only
python wfh.py train --seclists                # SecLists corpus (auto-discover)
python wfh.py train --auto --seclists         # combined (recommended)
python wfh.py train --seclists /path/to/SecLists --seclists-categories password frequency

The model stores only structural patterns — no PII, passwords, or company names.

Details: Wiki — ML Model


Credits & Inspiration

Project Inspiration
CUPP Personal target profiling
Crunch Charset-based generation
CeWL Web scraping for wordlists
CeWLeR Modern Python web scraping (JS/CSS/PDF)
routersploit Default credentials for IoT/routers
alterx DNS/subdomain fuzzing
pipal Statistical analysis
SecLists Curated security lists
elpscrk Permutation-based generation
BEWGor Biographical wordlist generator
pnwgen Phone number generation

Contributing

Contributions welcome. See CONTRIBUTING.md.

License

MIT License — Copyright (c) 2026 André Henrique (@mrhenrike)


Created by André Henrique (@mrhenrike)União Geek

Leia em Português · Full Documentation (Wiki)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

wfh_wordlist-2.3.0.tar.gz (232.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

wfh_wordlist-2.3.0-py3-none-any.whl (182.2 kB view details)

Uploaded Python 3

File details

Details for the file wfh_wordlist-2.3.0.tar.gz.

File metadata

  • Download URL: wfh_wordlist-2.3.0.tar.gz
  • Upload date:
  • Size: 232.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for wfh_wordlist-2.3.0.tar.gz
Algorithm Hash digest
SHA256 b0996749dec67d43470b208fb5e4830338c73dcb9f11e0d94fcff98cd9598724
MD5 a8f3e129b4f0ec71b631ed2b4631f6bb
BLAKE2b-256 381af20a346310c2bfa58b1b1a32153589b4282e983764fb1ed5432ab468b295

See more details on using hashes here.

Provenance

The following attestation bundles were made for wfh_wordlist-2.3.0.tar.gz:

Publisher: publish-pypi.yml on mrhenrike/WordListsForHacking

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file wfh_wordlist-2.3.0-py3-none-any.whl.

File metadata

  • Download URL: wfh_wordlist-2.3.0-py3-none-any.whl
  • Upload date:
  • Size: 182.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for wfh_wordlist-2.3.0-py3-none-any.whl
Algorithm Hash digest
SHA256 72db5a8ec37f130c06ddf745fd386922ac25f16407c55eb06a32e9a53e1f5327
MD5 7adf0d90a75af2d4e1b0ecbbee4ff20d
BLAKE2b-256 a479f5a186d600f18d8eadb4c109fb1a30b29ef23c98c1fea3469bfd9e48ef0e

See more details on using hashes here.

Provenance

The following attestation bundles were made for wfh_wordlist-2.3.0-py3-none-any.whl:

Publisher: publish-pypi.yml on mrhenrike/WordListsForHacking

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page