Sponsored
Dictionary and Bruteforce

Cook – A Customizable wordlist Generator For Hackers

Hey Folks, after a long break we have come up with a superior tool for you. The tool we are going to present with you is specially designed to create customizable wordlists and passwords called “Cook“. We can easily create permutations and combinations of words with predefined sets of extensions, words and patterns/function. We can use this tool to easily create complex endpoints and passwords according to our own unique secrets keyword.

Let’s take a look at it 🙂 !!

There are some major problems that will surely come with you, but we have already defended ourselves against errors so don’t worry we will give you solution for this.

Installation

After seeing this tool for the first time, we came to know that this tool is designed in GO environment, so we have to install GO utility in our machine to operate this tool.

apt install golang

Now we can install and configure this tool at the same time using only one command. After executing the command then we go to the following location, grab the entire configuration from there and paste it by creating a file called “cook.yaml”.

https://github.com/giteshnxtlvl/cook/blob/main/cook.yaml
cat > cook.yaml

Now we create an environment variable by using the following command. Now finally we are ready to test the amazing features of this tool.

export COOK=cook.yaml
cook -config

Understand the Scenario

We have done everything peacefully. Please keep your eyes open because anyone could hardly operate it before knowing the proper usage of this tool. Let me explain 🙂 !! Look at the image below, in which first we need to ingredients to the left side and on the other hand we need to define the pattern we want. Also it is not mandatory that we have to give the same name for those ingredients which have mentioned on the image rather we can keep it according to ourselves. So in our first attempt, we will initially choose two names, put a denominator in the middle and at the end take two more choices of names.

Impressive 🙂 !! See once in the image below how much effective output we get through this tool. For better understanding, we have highlighted the entire command thoroughly.

cook -start toor,root -sep _,-,? -end secret,critical /:start:sep:end

Create Parameters

Similarly, using the same ingredients and pattern, we can create a word list of parameters.

cook -start cat,id,c,redirect -sep = -end /etc/passwd,/etc/groups start:sep:end

Archive Wordlist

Sometimes we need a bunch of names to create an archive file in different formats, then we can use this tool.

cook -start admin,root start:archive

Create Charset Like Crunch

We can make any kind of charset wordlist, but before that you need to understand all its components.

Nice 🙂 !! As you can see we only have to follow the ingredients and the results are in front of you.

cook a:aA:s:n > passwd.lst

Similarly, in this endeavor we try to add some additional words according to us and we get the same wordlist as we wanted.

cook shubham:n:n:s > passwd.lst

Create Numbers

One of the best things that you find in this tool is to make the numerical wordlist in sequence and even this can help you make a list of unintentional phone numbers.

cook 9891:[10000-999999] > numbers.lst

That’s it 🙂 !! We think it will be enough for everyone to get a little knowledge about this tool and even once you have read the entire article carefully it can be easily operated.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.