Cook is a customizable wordlist and password generator. Easily create permutations and combinations of words with predefined sets of extensions, words and patterns/function to create complex endpoints, wordlists and passwords. Easy UX, Checkout Usage.
Installation
Using Go
go get github.com/giteshnxtlvl/cook
OR
GO111MODULE=on go get github.com/giteshnxtlvl/cook
Update
go get -u github.com/giteshnxtlvl/cook
Download latest builds
https://github.com/giteshnxtlvl/cook/releases/
Customizing Tool
By customizing you will able to make and use your own lists and patterns/functions.
cook.yaml or Download cook.yamlCOOK =Path of file How to setup up env variable?cook -configNote: If you don’t want to customize tool, then just don’t set COOK in env variables.
Basic Permutation
Recipe
cook -start admin,root -sep _,- -end secret,critical start:sep:end
cook admin,root:_,-:secret,critical
Advance Permutation
Understanding concept is important!
Predefined Sets
Recipe
cook -start admin,root -sep _ -end secret start:sep:archive
cook admin,root:_:archive
Create your own unique sets
Use it like CRUNCH
Patterns/Functions
Recipe
cook -name elliot -birth date(17,Sep,1994) name:birth
Int Ranges
Files
Regex Input from File
Recipe
cook -exp raft-large-extensions.txt:.asp.* /:admin:exp
Save Wordlists by Unique Names
File not found
If file mentioned in param not found, then there will be no errors, instead it will do this
cook -file file_not_exists.txt admin,root:_:file
admin_file_not_exists.txt
root_file_not_exists.txt
Cases
Contribute
Using COOK with other tools
Direct fuzzing with GoBuster
cook admin,root:_:archive | gobuster dir -u https://example.com/ -w –
Useful Resources
| List | Description |
|---|---|
| raft-large-extensions.txt | List of all extensions |
| all_tlds.txt | List of all tlds |
| Tip by Joel Verghese | FUZZ CDNs – Logical Fuzzing |
Todo
cook.yamlWhen people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…