Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!

cracked.io | Best Forum Around | Free Premium Accounts




 4146

Patator ~ Multi-Purpose Brute Forcer

by GettingRevenge - 24 August, 2018 - 02:00 PM
This post is by a banned member (Huka) - Unhide
Huka  
Registered
8
Posts
0
Threads
4 Years of service
#9
looks promising !
This post is by a banned member (rmg2011) - Unhide
rmg2011  
Registered
9
Posts
0
Threads
4 Years of service
#10
thanks man
This post is by a banned member (xor1010) - Unhide
xor1010  
Registered
25
Posts
1
Threads
5 Years of service
#11
Good Job ! Thanks you
This post is by a banned member (gh0stmtl) - Unhide
gh0stmtl  
Registered
23
Posts
0
Threads
4 Years of service
#12
Checking
This post is by a banned member (Mrtoofan) - Unhide
Mrtoofan  
Registered
36
Posts
0
Threads
4 Years of service
#13
Nice jobe bro
This post is by a banned member (yotango434) - Unhide
This post is by a banned member (mohsen7c) - Unhide
mohsen7c  
Registered
46
Posts
0
Threads
4 Years of service
#15
(24 August, 2018 - 02:00 PM)GettingRevenge Wrote: Show More
[Image: ?url=https%3A%2F%2Fwww.rekings.com%2Fwp-...40x313.png]
 
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors.
Currently it supports the following modules:
  • ftp_login: Brute-force FTP

  • ssh_login: Brute-force SSH

  • telnet_login: Brute-force Telnet

  • smtp_login: Brute-force SMTP

  • smtp_vrfy: Enumerate valid users using the SMTP VRFY command

  • smtp_rcpt: Enumerate valid users using the SMTP RCPT TO command

  • finger_lookup: Enumerate valid users using Finger

  • http_fuzz: Brute-force HTTP/HTTPS

  • rdp_gateway: Brute-force RDP Gateway

  • ajp_fuzz: Brute-force AJP

  • pop_login: Brute-force POP

  • pop_passd: Brute-force poppassd (not POP3)

  • imap_login: Brute-force IMAP

  • ldap_login: Brute-force LDAP

  • smb_login: Brute-force SMB

  • smb_lookupsid: Brute-force SMB SID-lookup

  • rlogin_login: Brute-force rlogin

  • vmauthd_login: Brute-force VMware Authentication Daemon

  • mssql_login: Brute-force MSSQL

  • oracle_login: Brute-force Oracle

  • mysql_login: Brute-force MySQL

  • mysql_query: Brute-force MySQL queries

  • rdp_login: Brute-force RDP (NLA)

  • pgsql_login: Brute-force PostgreSQL

  • vnc_login: Brute-force VNC

  • dns_forward: Brute-force DNS

  • dns_reverse: Brute-force DNS (reverse lookup subnets)

  • ike_enum: Enumerate IKE transforms

  • snmp_login: Brute-force SNMPv1/2 and SNMPv3

  • unzip_pass: Brute-force the password of encrypted ZIP files

  • keystore_pass: Brute-force the password of Java keystore files

  • sqlcipher_pass: Brute-force the password of SQLCipher-encrypted databases

  • umbraco_crack: Crack Umbraco HMAC-SHA1 password hashes
  •  
 
run it at a VM
i am not responsible if you dont use it

Credits go to h4ppy to leak this

wow thanks pogchamp
This post is by a banned member (FalconsGeek) - Unhide
82
Posts
0
Threads
4 Years of service
#16
thanks for this , will try it

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 2 Guest(s)