• We just launched and are currently in beta. Join us as we build and grow the community.

BEWGor – A Social Media Profiler Wordlist Generator

asdfasgb

Internet Pioneer
A Rep
0
0
0
Rep
0
A Vouches
0
0
0
Vouches
0
Posts
40
Likes
182
Bits
1 MONTH
1 1 MONTH OF SERVICE
LEVEL 1 400 XP
Purple-and-Pink-Brand-Guidelines-Presentation-2.png


Hey Folks, in this tutorial we are going to discuss on another wordlist generator called “BEWGor“. BEWGor is designed help with ensuring password security. BEWGor takes the simplest features of CUPP and does a very deep dive. It prompts the user for a lot more specific information, but not have all of CUPP’s capabilities. Let’s us show you some modern feature of this tool.

Features
  • Vastly Increased Information Detail on Main SubjectCreate.
  • Upper/Lower/Reverse variations of inputted values.
  • Set upper and lower limits on output line length.
  • Check that an inputted Birthday is valid.

Lets take a look 🙂 !!

Installation

The installation of this tool is quite simple, just we need to execute the following command sequentially and it will be configured automatically without any errors. But make sure python tools is already installed on your system.

git clone https://github.com/berzerk0/BEWGor.git
cd BEWGor
python BEWGor.py123git clone
https://github.com/berzerk0/BEWGor.gitcd BEWGorpython BEWGor.py

1-19.png


Now it’s time to boot this tool using the last command mentioned above. After starting this tool just hit enter button to go ahead.

2-23.png


Now again we have to hit enter to jump to the main feature of this tool.

3-20.png


Sometimes people keep the passwords of their accounts related to their relatives, favorite pets, actors, that’s why it will ask you all the necessary FAQs and you have to enter the information that you know about him.

4-19.png


After meeting the requirements it will create a directory which we can use to perform bruteforce attack.

5-18.png


Great 🙂 !! Suppose if the victim has kept their account passwords related to a specific location, the following wording can crack the password of the victim account because it includes all of the victim’s preferred locations. Likewise, the social engineering is the most important part for the bruteforcing attack.

6-17.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

432,073

312,529

312,538

Top