thad0ctor's Backtrack 5 toolkit Icon

thad0ctor's Backtrack 5 toolkit

thad0ctor's BT5 toolkit streamlines word list creation and other tasks

5.0 Stars (3)
8 Downloads (This Week)
Last Update:
Download thad0ctors Backtrack 5 toolkit
Browse All Files



Originally designed as a word list creation tool, thad0ctor's BT5 Toolkit has become an all purpose security script to help simplify many Backtrack 5 functions to help Pentesters strengthen their systems.

The backbone of thad0ctor's Backtrack 5 Toolkit is the Wordlist Toolkit that contains a plethora of tools to create, modify, and manipulate word lists in order for end users to strengthen their systems by testing their passwords against a variety of tools designed to expose their pass phrases. In short it is the ultimate tool for those looking to make a wide variety of word lists for dictionary based and other brute force attacks.

The toolkit is designed with usability in mind for the Backtrack 5R2 linux distro but will also work on BT5 R1 and other Ubuntu based distros if configured properly. The script is constantly updated with multiple revisions to include new cutting edge features and improvements in order to provide full spectrum wordlist creation capabilities.

thad0ctor's Backtrack 5 toolkit Web Site




  • Create word lists for SSNs, Phone Numbers, Date Ranges, Random Patterns, Password Policies, Patterns, from PDF/EBOOK files, for Default Router Passwords, or by profiling targets
  • Manipulate word lists by changing character cases, mirroring or doubling up words, reversing words prefixing or appending sequences of numbers or characters, inserting text, removing patterns or characters, converting words to 1337 speak, mangling words with John the Ripper and more
  • Optimize word lists by converting them to ASCII, trimming the words to set minimum and maximum lengths, sorting and removing duplicates, removing non-printable characters, splitting word lists into more manageable chunks and more
  • Analyzes word lists by viewing their line count, a break down of their most common patterns and characters used, search word lists for a certain string or sub-string, and calculate the time it would take to process a word list through a aircrack-ng or pyrit based dictionary attack
  • Combine individual word lists or word lists of a directory into a single word list and gather word lists system wide into one directory
  • Fully customize the usage of the script to streamline functionality. Change console output text color, configure passthough attack options for certain attacks, toggle or force on or off the GTK and CLI versions of the script, toggle whether or not to display the start up banner, toggle the main menu style and customize the script 1337ify options.
  • Stay up to date with a fully integrated and fool proof update system that pulls directly from the script's Sourceforge for up to the minute updates and configure whether or not you would like to auto-update the script on start up.
  • Make sure everything is working properly and dependencies are met with an automated dependency check and install system that takes all the pain and guesswork out of dependency issues.


Other Useful Business Software

The Leading Provider of Business VoIP Phone Systems Icon

Award-Winning Business VoIP Phone System

The Leading Provider of Business VoIP Phone Systems Icon
1 of 5 2 of 5 3 of 5 4 of 5 5 of 5
61 Reviews
  • Unlimited Calling, Faxing, Video Conferencing
  • 24/7 U.S. Based Customer Support
  • Super Reliable, Simple to Use

User Ratings

ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 5 / 5
Write a Review

User Reviews

  • 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5

    hi thad0ctors I re-edited the script to make it work on linux kali the posterior on the forum if there should be any problem please contact me and I will remove the link thank you very much for the hard work that you used to create the script :) and the security system does not I have by-passed because the program and can always yours and about and your :)

    Posted 10/13/2013
  • 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5

    Thanks for Thad0ctorstools, it's perfect!

    Posted 06/01/2013
Read more reviews

Additional Project Details

Intended Audience

Security Professionals

User Interface

Gnome, Command-line

Programming Language

Unix Shell



Thanks for helping keep SourceForge clean.

Screenshot instructions:
Red Hat Linux   Ubuntu

Click URL instructions:
Right-click on ad, choose "Copy Link", then paste here →
(This may not be possible with some types of ads)

More information about our ad policies

Briefly describe the problem (required):

Upload screenshot of ad (required):
Select a file, or drag & drop file here.

Please provide the ad click URL, if possible:

Get latest updates about Open Source Projects, Conferences and News.

Sign up for the SourceForge newsletter:

JavaScript is required for this form.

No, thanks