{"id":13475007,"url":"https://github.com/Mebus/cupp","last_synced_at":"2025-03-26T22:31:42.812Z","repository":{"id":3207761,"uuid":"4241751","full_name":"Mebus/cupp","owner":"Mebus","description":"Common User Passwords Profiler (CUPP)","archived":false,"fork":false,"pushed_at":"2023-11-20T10:04:19.000Z","size":2196,"stargazers_count":4684,"open_issues_count":59,"forks_count":1197,"subscribers_count":211,"default_branch":"master","last_synced_at":"2025-03-17T22:56:17.699Z","etag":null,"topics":["dictionary-attack","password","password-strength","weak-passwords","wordlist","wordlist-generator"],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Mebus.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2012-05-06T15:24:41.000Z","updated_at":"2025-03-17T16:31:38.000Z","dependencies_parsed_at":"2023-02-12T09:15:55.937Z","dependency_job_id":"8e561c6d-7a21-4601-a652-d805ef8ece57","html_url":"https://github.com/Mebus/cupp","commit_stats":{"total_commits":66,"total_committers":15,"mean_commits":4.4,"dds":0.5,"last_synced_commit":"56547fd09b87613cb2614feb5b7688907277a65a"},"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Mebus%2Fcupp","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Mebus%2Fcupp/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Mebus%2Fcupp/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Mebus%2Fcupp/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Mebus","download_url":"https://codeload.github.com/Mebus/cupp/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":245747892,"owners_count":20665883,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["dictionary-attack","password","password-strength","weak-passwords","wordlist","wordlist-generator"],"created_at":"2024-07-31T16:01:16.640Z","updated_at":"2025-03-26T22:31:39.247Z","avatar_url":"https://github.com/Mebus.png","language":"Python","readme":"# CUPP - Common User Passwords Profiler\n\n[![Build Status](https://travis-ci.org/Mebus/cupp.svg?branch=master)](https://travis-ci.org/Mebus/cupp)\n[![Coverage Status](https://coveralls.io/repos/github/Mebus/cupp/badge.svg)](https://coveralls.io/github/Mebus/cupp)\n[![Codacy Badge](https://api.codacy.com/project/badge/Grade/a578dde078ef481e97a0e7eac0c8d312)](https://app.codacy.com/app/Mebus/cupp?utm_source=github.com\u0026utm_medium=referral\u0026utm_content=Mebus/cupp\u0026utm_campaign=Badge_Grade_Dashboard)\n[![Rawsec's CyberSecurity Inventory](https://inventory.raw.pm/img/badges/Rawsec-inventoried-FF5050_plastic.svg)](https://inventory.raw.pm/)\n\n \n## About\n\n  The most common form of authentication is the combination of a username\n  and a password or passphrase. If both match values stored within a locally\n  stored table, the user is authenticated for a connection. Password strength is\n  a measure of the difficulty involved in guessing or breaking the password\n  through cryptographic techniques or library-based automated testing of\n  alternate values.\n\n  A weak password might be very short or only use alphanumberic characters,\n  making decryption simple. A weak password can also be one that is easily\n  guessed by someone profiling the user, such as a birthday, nickname, address,\n  name of a pet or relative, or a common word such as God, love, money or password.\n\n  That is why CUPP was born, and it can be used in situations like legal\n  penetration tests or forensic crime investigations.\n\n\nRequirements\n------------\n\nYou need Python 3 to run CUPP.\n\nQuick start\n-----------\n\n    $ python3 cupp.py -h\n\n## Options\n\n  Usage: cupp.py [OPTIONS]\n\n        -h      this menu\n\n        -i      Interactive questions for user password profiling\n\n        -w      Use this option to profile existing dictionary,\n                or WyD.pl output to make some pwnsauce :)\n\n        -l      Download huge wordlists from repository\n\n        -a      Parse default usernames and passwords directly from Alecto DB.\n                Project Alecto uses purified databases of Phenoelit and CIRT which where merged and enhanced.\n\n        -v      Version of the program\n\n\n\n## Configuration\n\n   CUPP has configuration file cupp.cfg with instructions.\n\n## Example (Fast forwarded)\n\n![cupp-example](screenshots/cupp-example.gif)\n\n## License\n\n  This program is free software; you can redistribute it and/or modify\n  it under the terms of the GNU General Public License as published by\n  the Free Software Foundation; either version 3 of the License, or\n  any later version.\n\n  This program is distributed in the hope that it will be useful,\n  but WITHOUT ANY WARRANTY; without even the implied warranty of\n  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the\n  GNU General Public License for more details.\n\n  You should have received a copy of the GNU General Public License\n  along with this program; if not, write to the Free Software\n  Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA\n\n  See './LICENSE' for more information.\n\n## Github import\n\nThis project was imported into https://github.com/Mebus/cupp by Mebus from:  \nhttp://www.remote-exploit.org/content/cupp-3.0.tar.gz  \nhttp://www.remote-exploit.org/articles/misc_research__amp_code/index.html  \nto encourage further development of the tool.\n\n## Original author\n\n  Muris Kurgas aka j0rgan  \n  j0rgan@remote-exploit.org  \n  http://www.remote-exploit.org  \n  http://www.azuzi.me  \n\n\n## Contributors\n\n  * Bosko Petrovic aka bolexxx  \n  bole_loser@hotmail.com  \n  http://www.offensive-security.com  \n  http://www.bolexxx.net  \n\n  * Mebus  \n    https://github.com/Mebus/  \n\n  * Abhro  \n    https://github.com/Abhro/  \n\n  * Andrea Giacomo  \n    https://github.com/codepr\n\n  * quantumcore  \n    https://github.com/quantumcore\n    \n\n","funding_links":[],"categories":["Uncategorized","HarmonyOS","Python","Tools","Python (1887)","Entries","Red Team","Wordlist tools"],"sub_categories":["Uncategorized","Windows Manager","Cracking","Password Cracking","Generation/Manipulation"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FMebus%2Fcupp","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FMebus%2Fcupp","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FMebus%2Fcupp/lists"}