Sponsored
Dictionary and Bruteforce

Cook – A Customizable wordlist Generator For Hackers

Hey Folks, after a long break we have come up with a superior tool for you. The tool we are going to present with you is specially designed to create customizable wordlists and passwords called “Cook“. We can easily create permutations and combinations of words with predefined sets of extensions, words and patterns/function. We can use this tool to easily create complex endpoints and passwords according to our own unique secrets keyword.

Let’s take a look at it 🙂 !!

There are some major problems that will surely come with you, but we have already defended ourselves against errors so don’t worry we will give you solution for this.

Installation

After seeing this tool for the first time, we came to know that this tool is designed in GO environment, so we have to install GO utility in our machine to operate this tool.

apt install golang

Now we can install and configure this tool at the same time using only one command. After executing the command then we go to the following location, grab the entire configuration from there and paste it by creating a file called “cook.yaml”.

https://github.com/giteshnxtlvl/cook/blob/main/cook.yaml
cat > cook.yaml

Now we create an environment variable by using the following command. Now finally we are ready to test the amazing features of this tool.

export COOK=cook.yaml
cook -config

Understand the Scenario

We have done everything peacefully. Please keep your eyes open because anyone could hardly operate it before knowing the proper usage of this tool. Let me explain 🙂 !! Look at the image below, in which first we need to ingredients to the left side and on the other hand we need to define the pattern we want. Also it is not mandatory that we have to give the same name for those ingredients which have mentioned on the image rather we can keep it according to ourselves. So in our first attempt, we will initially choose two names, put a denominator in the middle and at the end take two more choices of names.

Impressive 🙂 !! See once in the image below how much effective output we get through this tool. For better understanding, we have highlighted the entire command thoroughly.

cook -start toor,root -sep _,-,? -end secret,critical /:start:sep:end

Create Parameters

Similarly, using the same ingredients and pattern, we can create a word list of parameters.

cook -start cat,id,c,redirect -sep = -end /etc/passwd,/etc/groups start:sep:end

Archive Wordlist

Sometimes we need a bunch of names to create an archive file in different formats, then we can use this tool.

cook -start admin,root start:archive

Create Charset Like Crunch

We can make any kind of charset wordlist, but before that you need to understand all its components.

Nice 🙂 !! As you can see we only have to follow the ingredients and the results are in front of you.

cook a:aA:s:n > passwd.lst

Similarly, in this endeavor we try to add some additional words according to us and we get the same wordlist as we wanted.

cook shubham:n:n:s > passwd.lst

Create Numbers

One of the best things that you find in this tool is to make the numerical wordlist in sequence and even this can help you make a list of unintentional phone numbers.

cook 9891:[10000-999999] > numbers.lst

That’s it 🙂 !! We think it will be enough for everyone to get a little knowledge about this tool and even once you have read the entire article carefully it can be easily operated.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

Recent Posts

Gau (GetAllUrls) – Find Known and Hidden URL

The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…

3 months ago

Jsluicepp – Burp Extension for JS Secrets – BugBountyTip

Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…

8 months ago

Bypassing Firewalls (WAF) with XSS Payloads

Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…

8 months ago

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 year ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

2 years ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

3 years ago
Sponsored

This website uses cookies.