Skip to content

Build a modern password profiling and risk-analysis tool that simulates how real attackers guess passwords, helping organizations identify weak password practices.

Notifications You must be signed in to change notification settings

sanjayrohith/HumanHash

Repository files navigation

HumanHash Demo

🔐 HumanHash

Common User Passwords Profiler

Python 3 Platform Version


🎯 What is HumanHash?

HumanHash generates personalized password wordlists based on target information. People often create weak passwords using personal details like birthdays, pet names, or loved ones' names — HumanHash exploits this behavior for security testing.

⚠️ For authorized security testing and educational purposes only.


⚡ Quick Start

# Clone the repository
git clone <your-repo-url>
cd humanhash

# Run HumanHash
python3 humanhash.py -h

🛠️ Usage

python3 humanhash.py [OPTIONS]
Option Description
-i 🎤 Interactive mode — Answer questions to generate a custom wordlist
-w 📝 Improve wordlist — Enhance an existing dictionary file
-l 📥 Download wordlists — Fetch large wordlists from repository
-a 🗄️ Alecto DB — Parse default credentials from Alecto database
-v ℹ️ Version — Display program version
-h Help — Show help menu

🎮 Interactive Mode

The most powerful feature — generates passwords based on target profile:

python3 humanhash.py -i

You'll be prompted for:

  • 👤 Name, surname, nickname
  • 🎂 Birthdate
  • 💑 Partner's information
  • 👶 Children's information
  • 🐕 Pet names
  • 🏢 Company name
  • 🔑 Custom keywords

⚙️ Configuration

Customize behavior via humanhash.cfg:

  • Leet mode substitutions (a→4, e→3, etc.)
  • Special characters to append
  • Year ranges for combinations
  • Password length filters

📁 Project Structure

humanhash/
├── humanhash.py          # Main script
├── humanhash.cfg         # Configuration file
├── test_humanhash.py     # Unit tests
└── screenshots/     # Demo assets

Made with ☕ for the security community

About

Build a modern password profiling and risk-analysis tool that simulates how real attackers guess passwords, helping organizations identify weak password practices.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages