This post is by a banned member (Huka) - Unhide
16 February, 2020 - 06:04 AM
Reply
This post is by a banned member (rmg2011) - Unhide
17 February, 2020 - 05:06 PM
Reply
This post is by a banned member (xor1010) - Unhide
23 February, 2020 - 03:26 PM
Reply
This post is by a banned member (gh0stmtl) - Unhide
11 March, 2020 - 10:07 PM
Reply
This post is by a banned member (Mrtoofan) - Unhide
20 April, 2020 - 01:50 AM
Reply
This post is by a banned member (yotango434) - Unhide
23 April, 2020 - 06:47 AM
Reply
This post is by a banned member (mohsen7c) - Unhide
19 May, 2020 - 08:49 AM
Reply
(24 August, 2018 - 02:00 PM)GettingRevenge Wrote: Show More
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors.
Currently it supports the following modules:- ftp_login: Brute-force FTP
- ssh_login: Brute-force SSH
- telnet_login: Brute-force Telnet
- smtp_login: Brute-force SMTP
- smtp_vrfy: Enumerate valid users using the SMTP VRFY command
- smtp_rcpt: Enumerate valid users using the SMTP RCPT TO command
- finger_lookup: Enumerate valid users using Finger
- http_fuzz: Brute-force HTTP/HTTPS
- rdp_gateway: Brute-force RDP Gateway
- ajp_fuzz: Brute-force AJP
- pop_login: Brute-force POP
- pop_passd: Brute-force poppassd (not POP3)
- imap_login: Brute-force IMAP
- ldap_login: Brute-force LDAP
- smb_login: Brute-force SMB
- smb_lookupsid: Brute-force SMB SID-lookup
- rlogin_login: Brute-force rlogin
- vmauthd_login: Brute-force VMware Authentication Daemon
- mssql_login: Brute-force MSSQL
- oracle_login: Brute-force Oracle
- mysql_login: Brute-force MySQL
- mysql_query: Brute-force MySQL queries
- rdp_login: Brute-force RDP (NLA)
- pgsql_login: Brute-force PostgreSQL
- vnc_login: Brute-force VNC
- dns_forward: Brute-force DNS
- dns_reverse: Brute-force DNS (reverse lookup subnets)
- ike_enum: Enumerate IKE transforms
- snmp_login: Brute-force SNMPv1/2 and SNMPv3
- unzip_pass: Brute-force the password of encrypted ZIP files
- keystore_pass: Brute-force the password of Java keystore files
- sqlcipher_pass: Brute-force the password of SQLCipher-encrypted databases
- umbraco_crack: Crack Umbraco HMAC-SHA1 password hashes
-
run it at a VM
i am not responsible if you dont use it
Credits go to h4ppy to leak this
wow thanks
This post is by a banned member (FalconsGeek) - Unhide
25 May, 2020 - 03:10 AM
Reply
thanks for this , will try it