This post is by a banned member (GettingRevenge) - Unhide
OP 24 August, 2018 - 02:00 PM
(This post was last modified: 24 August, 2018 - 02:02 PM by GettingRevenge.)
Reply
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors.
Currently it supports the following modules:- ftp_login: Brute-force FTP
- ssh_login: Brute-force SSH
- telnet_login: Brute-force Telnet
- smtp_login: Brute-force SMTP
- smtp_vrfy: Enumerate valid users using the SMTP VRFY command
- smtp_rcpt: Enumerate valid users using the SMTP RCPT TO command
- finger_lookup: Enumerate valid users using Finger
- http_fuzz: Brute-force HTTP/HTTPS
- rdp_gateway: Brute-force RDP Gateway
- ajp_fuzz: Brute-force AJP
- pop_login: Brute-force POP
- pop_passd: Brute-force poppassd (not POP3)
- imap_login: Brute-force IMAP
- ldap_login: Brute-force LDAP
- smb_login: Brute-force SMB
- smb_lookupsid: Brute-force SMB SID-lookup
- rlogin_login: Brute-force rlogin
- vmauthd_login: Brute-force VMware Authentication Daemon
- mssql_login: Brute-force MSSQL
- oracle_login: Brute-force Oracle
- mysql_login: Brute-force MySQL
- mysql_query: Brute-force MySQL queries
- rdp_login: Brute-force RDP (NLA)
- pgsql_login: Brute-force PostgreSQL
- vnc_login: Brute-force VNC
- dns_forward: Brute-force DNS
- dns_reverse: Brute-force DNS (reverse lookup subnets)
- ike_enum: Enumerate IKE transforms
- snmp_login: Brute-force SNMPv1/2 and SNMPv3
- unzip_pass: Brute-force the password of encrypted ZIP files
- keystore_pass: Brute-force the password of Java keystore files
- sqlcipher_pass: Brute-force the password of SQLCipher-encrypted databases
- umbraco_crack: Crack Umbraco HMAC-SHA1 password hashes
-
Hidden Content
You must
register or
login to view this content.
run it at a VM
i am not responsible if you dont use it
Credits go to h4ppy to leak this
This leak has been rated as not working 0 times this month. (1 times in total)
Shinzou Wo Sasageyo!!!!!!!!!!!!!!!
This post is by a banned member (aalex2215) - Unhide
26 August, 2018 - 01:19 AM
Reply
Good Job and i hope it work well
This post is by a banned member (nipheemy) - Unhide
22 October, 2018 - 07:59 AM
(This post was last modified: 22 October, 2018 - 04:48 PM by nipheemy.)
Reply
this good if it work
this good if it work
This post is by a banned member (amsnhj) - Unhide
23 November, 2019 - 05:24 AM
Reply
This post is by a banned member (redyopa1252) - Unhide
09 December, 2019 - 05:36 PM
Reply
This post is by a banned member (psyifex1) - Unhide
16 December, 2019 - 06:36 PM
Reply
thanks Patator ~ Multi-Purpose Brute Forcer
This post is by a banned member (GregA) - Unhide
31 December, 2019 - 09:54 PM
Reply
Thanks for leaking this man!
This post is by a banned member (evergreen94) - Unhide
03 February, 2020 - 04:08 PM
Reply
(24 August, 2018 - 02:00 PM)GettingRevenge Wrote: Show More
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors.
Currently it supports the following modules:- ftp_login: Brute-force FTP
- ssh_login: Brute-force SSH
- telnet_login: Brute-force Telnet
- smtp_login: Brute-force SMTP
- smtp_vrfy: Enumerate valid users using the SMTP VRFY command
- smtp_rcpt: Enumerate valid users using the SMTP RCPT TO command
- finger_lookup: Enumerate valid users using Finger
- http_fuzz: Brute-force HTTP/HTTPS
- rdp_gateway: Brute-force RDP Gateway
- ajp_fuzz: Brute-force AJP
- pop_login: Brute-force POP
- pop_passd: Brute-force poppassd (not POP3)
- imap_login: Brute-force IMAP
- ldap_login: Brute-force LDAP
- smb_login: Brute-force SMB
- smb_lookupsid: Brute-force SMB SID-lookup
- rlogin_login: Brute-force rlogin
- vmauthd_login: Brute-force VMware Authentication Daemon
- mssql_login: Brute-force MSSQL
- oracle_login: Brute-force Oracle
- mysql_login: Brute-force MySQL
- mysql_query: Brute-force MySQL queries
- rdp_login: Brute-force RDP (NLA)
- pgsql_login: Brute-force PostgreSQL
- vnc_login: Brute-force VNC
- dns_forward: Brute-force DNS
- dns_reverse: Brute-force DNS (reverse lookup subnets)
- ike_enum: Enumerate IKE transforms
- snmp_login: Brute-force SNMPv1/2 and SNMPv3
- unzip_pass: Brute-force the password of encrypted ZIP files
- keystore_pass: Brute-force the password of Java keystore files
- sqlcipher_pass: Brute-force the password of SQLCipher-encrypted databases
- umbraco_crack: Crack Umbraco HMAC-SHA1 password hashes
run it at a VM
i am not responsible if you dont use it
Credits go to h4ppy to leak this