Sponsored
Dictionary and Bruteforce

BEWGor – A Social Media Profiler Wordlist Generator

Hey Folks, in this tutorial we are going to discuss on another wordlist generator called “BEWGor“. BEWGor is designed help with ensuring password security. BEWGor takes the simplest features of CUPP and does a very deep dive. It prompts the user for a lot more specific information, but not have all of CUPP’s capabilities. Let’s us show you some modern feature of this tool.

Features

  • Vastly Increased Information Detail on Main SubjectCreate.
  • Upper/Lower/Reverse variations of inputted values.
  • Set upper and lower limits on output line length.
  • Check that an inputted Birthday is valid.

Lets take a look 🙂 !!

Installation

The installation of this tool is quite simple, just we need to execute the following command sequentially and it will be configured automatically without any errors. But make sure python tools is already installed on your system.

git clone https://github.com/berzerk0/BEWGor.git
cd BEWGor
python BEWGor.py

Now it’s time to boot this tool using the last command mentioned above. After starting this tool just hit enter button to go ahead.

Now again we have to hit enter to jump to the main feature of this tool.

Sometimes people keep the passwords of their accounts related to their relatives, favorite pets, actors, that’s why it will ask you all the necessary FAQs and you have to enter the information that you know about him.

After meeting the requirements it will create a directory which we can use to perform bruteforce attack.

Great 🙂 !! Suppose if the victim has kept their account passwords related to a specific location, the following wording can crack the password of the victim account because it includes all of the victim’s preferred locations. Likewise, the social engineering is the most important part for the bruteforcing attack.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored
Shubham Goyal

A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.

Recent Posts

Gau (GetAllUrls) – Find Known and Hidden URL

The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…

4 months ago

Jsluicepp – Burp Extension for JS Secrets – BugBountyTip

Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…

9 months ago

Bypassing Firewalls (WAF) with XSS Payloads

Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…

9 months ago

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 year ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

2 years ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

3 years ago
Sponsored

This website uses cookies.