PassingCrackwords generates targeted base-word dictionaries for credential testing. Two modes, one output format — plain text wordlists optimised for rule-based expansion.
Enter any city, region, or country. AI generates up to 1,000 culturally relevant base words — sports teams, landmarks, local businesses, universities, historical figures, regional slang, food, and cultural references. Output is base words only, ready for rule expansion.
Enter a target URL. Our crawler crawls the site and extracts every unique word the organisation uses — brand names, product lines, executive names, campaign terms, and industry jargon. No word cap. Runs entirely locally, no AI API cost.
Default crawl depth is 1 (homepage only). Increase in Advanced Options for broader coverage. Deeper crawls take longer and may approach the Cloudflare tunnel timeout on large sites.
City detection is enabled by default on Site Scrape. After the crawl completes, the tool looks up the company's global headquarters via live web search, then runs a Location AI pass for that city and appends the results to your wordlist.
City detection uses live web search to verify current headquarters data rather than relying on static model knowledge. If the company is not found with high confidence, city detection is skipped and the scrape-only wordlist is returned.
Output is a plain-text .txt file, one word per line, deduplicated. The filename encodes mode, target, and date:
crackwords_scrape_https___target_com_2026-03-11.txt crackwords_location_Houston_Texas_2026-03-11.txt
Words are not pre-expanded with year suffixes, l33tspeak, capitalisation variants, or special character appends. This is intentional — rule engines like d3adOne and best64 generate these variants more comprehensively and efficiently at crack time. Pre-expanding inflates the wordlist with lower-quality variants and slows your attack.
# Apply d3adOne rule (recommended for targeted attacks) hashcat -a 0 -m 1000 hashes.ntds wordlist.txt -r d3adOne.rule # Stack rules for broader coverage hashcat -a 0 -m 1000 hashes.ntds wordlist.txt -r best64.rule -r d3adOne.rule # Combine multiple wordlists before applying rules cat location_wordlist.txt scrape_wordlist.txt | sort -u > combined.txt hashcat -a 0 -m 1000 hashes.ntds combined.txt -r d3adOne.rule
Upload the .txt file as a custom wordlist in your Pentera campaign configuration. Pentera's rules engine applies variant expansion automatically — do not pre-expand before importing. Base words are the correct format.
medusa -H targets.txt -U users.txt -P crackwords_output.txt -M ssh -t 4
# NTLM hashes with rule expansion hashcat -m 1000 -a 0 hashes.ntds crackwords_output.txt -r d3adOne.rule --force # NetNTLMv2 hashcat -m 5600 -a 0 captured.txt crackwords_output.txt -r best64.rule
Load the .txt file as a Simple List payload in Intruder. Use against login endpoints in a credential stuffing test. Combine with a username list from LinkedIn or OSINT for targeted spraying.