Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   4316

Patator ~ Multi-Purpose Brute Forcer

by GettingRevenge - 24 August, 2018 - 02:00 PM
This post is by a banned member (trkbstgg) - Unhide
trkbstgg  
Registered
19
Posts
0
Threads
5 Years of service
#17
thans mate :^)
This post is by a banned member (bmcandeias) - Unhide
5
Posts
0
Threads
4 Years of service
#18
(24 August, 2018 - 02:00 PM)GettingRevenge Wrote: Show More
[Image: ?url=https%3A%2F%2Fwww.rekings.com%2Fwp-...40x313.png]thx alot
 
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors.
Currently it supports the following modules:
  • ftp_login: Brute-force FTP

  • ssh_login: Brute-force SSH

  • telnet_login: Brute-force Telnet

  • smtp_login: Brute-force SMTP

  • smtp_vrfy: Enumerate valid users using the SMTP VRFY command

  • smtp_rcpt: Enumerate valid users using the SMTP RCPT TO command

  • finger_lookup: Enumerate valid users using Finger

  • http_fuzz: Brute-force HTTP/HTTPS

  • rdp_gateway: Brute-force RDP Gateway

  • ajp_fuzz: Brute-force AJP

  • pop_login: Brute-force POP

  • pop_passd: Brute-force poppassd (not POP3)

  • imap_login: Brute-force IMAP

  • ldap_login: Brute-force LDAP

  • smb_login: Brute-force SMB

  • smb_lookupsid: Brute-force SMB SID-lookup

  • rlogin_login: Brute-force rlogin

  • vmauthd_login: Brute-force VMware Authentication Daemon

  • mssql_login: Brute-force MSSQL

  • oracle_login: Brute-force Oracle

  • mysql_login: Brute-force MySQL

  • mysql_query: Brute-force MySQL queries

  • rdp_login: Brute-force RDP (NLA)

  • pgsql_login: Brute-force PostgreSQL

  • vnc_login: Brute-force VNC

  • dns_forward: Brute-force DNS

  • dns_reverse: Brute-force DNS (reverse lookup subnets)

  • ike_enum: Enumerate IKE transforms

  • snmp_login: Brute-force SNMPv1/2 and SNMPv3

  • unzip_pass: Brute-force the password of encrypted ZIP files

  • keystore_pass: Brute-force the password of Java keystore files

  • sqlcipher_pass: Brute-force the password of SQLCipher-encrypted databases

  • umbraco_crack: Crack Umbraco HMAC-SHA1 password hashes
  •  
 
run it at a VM
i am not responsible if you dont use it

Credits go to h4ppy to leak this

thx alot
This post is by a banned member (Topic5678) - Unhide
This post is by a banned member (YouHearThatDorking) - Unhide
41
Posts
0
Threads
4 Years of service
#20
Thank you
This post is by a banned member (HotNiggus) - Unhide
This post is by a banned member (berlin2019) - Unhide
59
Posts
5
Threads
5 Years of service
#22
(This post was last modified: 24 May, 2021 - 12:58 AM by berlin2019.)
thanks for the share!

EDIT: LINK BROKEN
This post is by a banned member (jferrazfilho) - Unhide
2
Posts
0
Threads
4 Years of service
#23
(24 August, 2018 - 02:00 PM)GettingRevenge Wrote: Show More
[Image: ?url=https%3A%2F%2Fwww.rekings.com%2Fwp-...40x313.png]
 
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors.
Currently it supports the following modules:
  • ftp_login: Brute-force FTP

  • ssh_login: Brute-force SSH

  • telnet_login: Brute-force Telnet

  • smtp_login: Brute-force SMTP

  • smtp_vrfy: Enumerate valid users using the SMTP VRFY command

  • smtp_rcpt: Enumerate valid users using the SMTP RCPT TO command

  • finger_lookup: Enumerate valid users using Finger

  • http_fuzz: Brute-force HTTP/HTTPS

  • rdp_gateway: Brute-force RDP Gateway

  • ajp_fuzz: Brute-force AJP

  • pop_login: Brute-force POP

  • pop_passd: Brute-force poppassd (not POP3)

  • imap_login: Brute-force IMAP

  • ldap_login: Brute-force LDAP

  • smb_login: Brute-force SMB

  • smb_lookupsid: Brute-force SMB SID-lookup

  • rlogin_login: Brute-force rlogin

  • vmauthd_login: Brute-force VMware Authentication Daemon

  • mssql_login: Brute-force MSSQL

  • oracle_login: Brute-force Oracle

  • mysql_login: Brute-force MySQL

  • mysql_query: Brute-force MySQL queries

  • rdp_login: Brute-force RDP (NLA)

  • pgsql_login: Brute-force PostgreSQL

  • vnc_login: Brute-force VNC

  • dns_forward: Brute-force DNS

  • dns_reverse: Brute-force DNS (reverse lookup subnets)

  • ike_enum: Enumerate IKE transforms

  • snmp_login: Brute-force SNMPv1/2 and SNMPv3

  • unzip_pass: Brute-force the password of encrypted ZIP files

  • keystore_pass: Brute-force the password of Java keystore files

  • sqlcipher_pass: Brute-force the password of SQLCipher-encrypted databases

  • umbraco_crack: Crack Umbraco HMAC-SHA1 password hashes
  •  
 
run it at a VM
i am not responsible if you dont use it

Credits go to h4ppy to leak this

buena manito mue malo
This post is by a banned member (mrlekat) - Unhide

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)