Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   11988

RDP Checker

by m4l0n - 06 September, 2019 - 10:05 AM
This post is by a banned member (rachidO8) - Unhide
rachidO8  
Registered
3
Posts
0
Threads
5 Years of service
Tanks
This post is by a banned member (alexanderderbil) - Unhide
5
Posts
0
Threads
5 Years of service
wowwwwwwwwwwwwwwww
This post is by a banned member (antz221) - Unhide
antz221  
Registered
5
Posts
0
Threads
5 Years of service
[font]Interesting hope it works [/font]
This post is by a banned member (bobdessert17) - Unhide
This post is by a banned member (anasjeay) - Unhide
This post is by a banned member (amine0541) - Unhide
amine0541  
Registered
2
Posts
0
Threads
5 Years of service
thanks
This post is by a banned member (mahdidiego) - Unhide
This post is by a banned member (AmineDz2012) - Unhide
40
Posts
0
Threads
5 Years of service
(06 September, 2019 - 10:05 AM)m3l0nch0l1c Wrote: Show More
Not made by me but I pulled the source code from Github and built it.

[Image: image.png]

Supported windows servers: from Windows Server 2003 to Windows Server 2008/2012 and even Windows Server 2016


This tool can detect successful user login (not just checking user/pass)
Made for authorization checking on plenty number of RDP servers.
Its not too fast to be used as RDP brute tool, but its very accurate and reliable on checking already cracked RDP's :)

Notice: This tool has the opportunity to become a RDP cracker by implementing multi threading.



 
Code:
 
1. Create a text file contained RDP's inormation in following format per line.

[Ip Address]:[port]@[Machine name]\[Username];[Password]

example: 4.2.2.4:3389@noise\administrator;root

2. Open up the app and click load then start and wait...

 gre ger g erg

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)