Password Attackspasswordanalysisstatisticswordlistdump

pipal

pipal performs statistical analysis on password dumps to generate stats and information for analyzing passwords. It provides insights into top passwords, base words, lengths, and other patterns.

Description

pipal is a tool designed for statistical analysis on password dumps. All it does is give you the stats and information to help analyze the passwords, with the real work being interpretation of the results by the user.

It processes password files to output metrics like total entries, unique entries, top passwords, top base words, and password length distributions. This is useful for understanding password strength and common patterns in leaked or captured password lists.

Use cases include reviewing wordlists for penetration testing, analyzing breach data for security audits, or identifying weak password trends in organizational assessments.

How It Works

pipal reads a password file and performs statistical analysis, counting occurrences of passwords, extracting base words, and categorizing by length. It supports checkers for various analyses and can output results to files or console. Processing shows progress with a percentage bar and allows early termination with CTRL-C to dump stats on processed words.

Installation

bash
sudo apt install pipal

Flags

--help, -h, -?show help
--top, -t Xshow the top X results (default 10)
--output, -o <filename>output to file
--gkey <Google Maps API key>to allow zip code lookups (optional)
--list-checkersShow the available checkers and which are enabled
--verbose, -vVerbose

Examples

Analyze and display the top 5 passwords using the given file as input
pipal -t 5 /usr/share/wordlists/nmap.lst
Show help and usage information
pipal -h
Show the top 10 passwords from a password file (default top count)
pipal -t 10 /path/to/passwords.txt
Output analysis results to a file
pipal -o output.txt /path/to/passwords.txt
Show the available checkers and which are enabled
pipal --list-checkers
Run analysis in verbose mode
pipal -v /path/to/passwords.txt
Run analysis with Google Maps API key for zip code lookups
pipal --gkey APIKEY /path/to/passwords.txt
Updated 2026-04-16kali.org ↗