Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   4378

Patator ~ Multi-Purpose Brute Forcer

by GettingRevenge - 24 August, 2018 - 02:00 PM
This post is by a banned member (bluewfire) - Unhide
bluewfire  
Registered
99
Posts
0
Threads
2 Years of service
#33
nice
This post is by a banned member (ljhgf) - Unhide
ljhgf  
Registered
41
Posts
2
Threads
2 Years of service
#34
(This post was last modified: 24 July, 2023 - 11:32 AM by ljhgf. Edited 1 time in total.)
works ?
This post is by a banned member (27genies) - Unhide
27genies  
Registered
16
Posts
0
Threads
1 Year of service
#35
gg
(24 August, 2018 - 02:00 PM)GettingRevenge Wrote: Show More
[Image: ?url=https%3A%2F%2Fwww.rekings.com%2Fwp-...40x313.png]
 
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors.
Currently it supports the following modules:
  • ftp_login: Brute-force FTP

  • ssh_login: Brute-force SSH

  • telnet_login: Brute-force Telnet

  • smtp_login: Brute-force SMTP

  • smtp_vrfy: Enumerate valid users using the SMTP VRFY command

  • smtp_rcpt: Enumerate valid users using the SMTP RCPT TO command

  • finger_lookup: Enumerate valid users using Finger

  • http_fuzz: Brute-force HTTP/HTTPS

  • rdp_gateway: Brute-force RDP Gateway

  • ajp_fuzz: Brute-force AJP

  • pop_login: Brute-force POP

  • pop_passd: Brute-force poppassd (not POP3)

  • imap_login: Brute-force IMAP

  • ldap_login: Brute-force LDAP

  • smb_login: Brute-force SMB

  • smb_lookupsid: Brute-force SMB SID-lookup

  • rlogin_login: Brute-force rlogin

  • vmauthd_login: Brute-force VMware Authentication Daemon

  • mssql_login: Brute-force MSSQL

  • oracle_login: Brute-force Oracle

  • mysql_login: Brute-force MySQL

  • mysql_query: Brute-force MySQL queries

  • rdp_login: Brute-force RDP (NLA)

  • pgsql_login: Brute-force PostgreSQL

  • vnc_login: Brute-force VNC

  • dns_forward: Brute-force DNS

  • dns_reverse: Brute-force DNS (reverse lookup subnets)

  • ike_enum: Enumerate IKE transforms

  • snmp_login: Brute-force SNMPv1/2 and SNMPv3

  • unzip_pass: Brute-force the password of encrypted ZIP files

  • keystore_pass: Brute-force the password of Java keystore files

  • sqlcipher_pass: Brute-force the password of SQLCipher-encrypted databases

  • umbraco_crack: Crack Umbraco HMAC-SHA1 password hashes
  •  
 
run it at a VM
i am not responsible if you dont use it

Credits go to h4ppy to leak this
This post is by a banned member (saydin20299) - Unhide
142
Posts
0
Threads
3 Years of service
#36
not worning 2024
This post is by a banned member (bruh23231) - Unhide

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)