Skip to content

mbcyberworks/pnpt-wordlist-generator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

PNPT Wordlist Generator – MB Cyberworks

License: MIT Shell Script Kali

A professional, engagement-ready wordlist generator designed for penetration testers.
Generates high-quality, realistic, and efficient wordlists for:

  • Active Directory Password Spraying
  • Kerberos / AS-REP Roasting
  • SMB / LDAP / RDP low-noise spraying
  • Web login brute forcing (Hydra / Burp Suite)
  • SSH / FTP brute forcing
  • Offline cracking (hashcat)

All wordlists are English-only, optimized for PNPT-level engagements, CTFs, and real-world pentests.


πŸ“‹ Requirements

  • Linux/Unix system (Kali Linux recommended)
  • Bash 4.0+
  • Optional: RockYou wordlist (/usr/share/wordlists/rockyou.txt)

πŸ“¦ Installation

git clone https://github.com/mbcyberworks/pnpt-wordlist-generator
cd pnpt-wordlist-generator
chmod +x pnpt-wordlist-generator.sh

πŸ›  Usage

Simple version:

./pnpt-wordlist-generator.sh <CompanyName>

Examples:

./pnpt-wordlist-generator.sh Capstone
./pnpt-wordlist-generator.sh Marvel

Optional: specify RockYou path:

./pnpt-wordlist-generator.sh Capstone /usr/share/wordlists/rockyou.txt

Output directory:

pnpt-wordlists/
β”œβ”€β”€ pnpt_spray.txt
β”œβ”€β”€ pnpt_bruteforce.txt
β”œβ”€β”€ pnpt_ultimate.txt
└── component files

πŸ“Š Generated Wordlist Stats (example: "Marvel")

File Entries Use Case
pnpt_spray.txt ~120 AD spraying (safe)
pnpt_bruteforce.txt ~4000 Web/SSH brute force
pnpt_ultimate.txt ~4500 Offline cracking

πŸ“‚ Output Overview

1. pnpt_spray.txt β€” Small & Safe

Used for:

  • Kerberos password spraying
  • AS-REP roasting username validation
  • SMB / LDAP spraying
  • RDP low-noise attempts

Contains:

  • base weak passwords
  • seasons & years
  • company patterns
  • department names
  • complexity strings

Safe by design to prevent lockouts and SIEM alerts.


2. pnpt_bruteforce.txt β€” Medium Power

Best for:

  • Hydra login brute forcing
  • Burp Suite Intruder
  • SSH / FTP brute forcing
  • Weak password testing in labs

Includes:

  • everything from the spraylist
  • custom high-value words
  • curated RockYou top-3500

3. pnpt_ultimate.txt β€” Full Combined List

Best for offline cracking or extended brute forcing.


πŸ§ͺ Pentest Usage Examples

Hydra – Web Login

hydra -l admin -P pnpt-wordlists/pnpt_bruteforce.txt \
  10.10.10.10 http-post-form \
  "/login:username=^USER^&password=^PASS^:Invalid"

NetExec – SMB / AD Spray

netexec smb 10.10.10.0/24 -u users.txt \
  -p pnpt-wordlists/pnpt_spray.txt \
  --continue-on-success

Kerberos Password Spraying

kerbrute passwordspray -d marvel.local users.txt pnpt-wordlists/pnpt_spray.txt

SSH Brute Force

hydra -l root -P pnpt-wordlists/pnpt_bruteforce.txt <target> ssh

Hashcat

hashcat -m 3200 hashes.txt pnpt-wordlists/pnpt_ultimate.txt

πŸ”§ Troubleshooting

Note: <CompanyName> is always required as the first argument, even when troubleshooting RockYou. The script will not run without it.

Issue: RockYou not found

The script could not locate the RockYou wordlist at the default path:

/usr/share/wordlists/rockyou.txt

This is optional β€” the script will still run without it.

βœ… Solution 1: Install SecLists (recommended)

sudo apt install seclists

The RockYou file will then be available at:

/usr/share/seclists/Passwords/Leaked-Databases/rockyou.txt

Tell the script where it is:

./pnpt-wordlist-generator.sh MyCompany \
  /usr/share/seclists/Passwords/Leaked-Databases/rockyou.txt

βœ… Solution 2: Specify ANY custom RockYou path

./pnpt-wordlist-generator.sh MyCompany /path/to/rockyou.txt

βœ… Solution 3: Skip RockYou entirely

If you don't need RockYou entries, simply run the script without providing a path:

./pnpt-wordlist-generator.sh MyCompany

The spraylist and bruteforce list will still be fully functional.


🀝 Contributing

Found a bug or want to add patterns? PRs and issues are welcome!

  • Bug fixes
  • New patterns for industries
  • Performance improvements

✨ Credits

Created by MB Cyberworks.


πŸ›‘ License

MIT License β€” Use responsibly.

Releases

No releases published

Packages

 
 
 

Contributors

Languages