Wordlist-Generator : Unique Wordlist Generator Of Unique Wordlists

Wordlist-Generator generates wordlists with unique words with techniques mentioned in tomnomnom’s report “Who, What, Where, When”. It takes URLs from gau and splits them to get words in URLs.

Then it requests each URL to fetch all words. Finally, wordlist_generator removes from wordlist everything from “denylists” directory files to keep only unique words, which you can use for domain, directory, parameter, vhosts, etc bruteforcing.

Usage

  • Examples:

$ ./wordlist_generator.py -d hackerone.com -a 5000 -t 50
$ ./wordlist_generator.py -d bugcrowd.com -a 1000
$ ./wordlist_generator.py -d intigriti.com > intigriti_wordlist.txt

To display the help for the tool use the -h flag:

./wordlist_generator.py -h

FlagDescriptionExample
-domaintarget domain./wordlist_generator.py -d openbugbounty.org
-threadsthreads amount./wordlist_generator.py -d yahoo.com -t 6
-amountamount of URLs to fetch from gau/wordlist_generator.py -d twitter.com -a 10000

Installation

$ git clone https://github.com/SomeKirill/wordlist_generator/
$ cd wordlist_generator
$ pip install requests

Denylists Wordlists Used

R K

Recent Posts

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

38 minutes ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

2 hours ago

What is SIEM? Complete Guide to Security Information and Event Management

Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…

12 hours ago

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

24 hours ago

Top OSINT Tools to Find Emails, Usernames and Passwords

Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…

2 days ago

Google Dorking in Cybersecurity: A Complete Guide

Introduction In the vast ocean of the internet, the most powerful tool you already have…

2 days ago