Loading ...

brutespray

Package

  • brutespray - Python bruteforce tool

Usage

usage: brutespray [-h] [-f FILE] [-o OUTPUT] [-s SERVICE] [-t THREADS] [-T HOSTS] [-U USERLIST] [-P PASSLIST] [-C COMBO] [-u USERNAME] [-p PASSWORD] [-c] [-i] [-m] [-q] [-v VERBOSE] [-w DEBUG]
options:
-h, --help show this help message and exit
Menu Options:
-f FILE, --file FILE GNMAP, JSON or XML file to parse
-o OUTPUT, --output OUTPUT
Directory containing successful attempts
-s SERVICE, --service SERVICE
specify service to attack
-t THREADS, --threads THREADS
number of medusa threads
-T HOSTS, --hosts HOSTS
number of hosts to test concurrently
-U USERLIST, --userlist USERLIST
reference a custom username file
-P PASSLIST, --passlist PASSLIST
reference a custom password file
-C COMBO, --combo COMBO
specify a combo input (host:user:password)
-u USERNAME, --username USERNAME
specify a single username
-p PASSWORD, --password PASSWORD
specify a single password
-c, --continuous keep brute-forcing after success
-i, --interactive interactive mode
-m, --modules dump a list of available modules to brute
-q, --quiet supress banner
-v VERBOSE, --verbose VERBOSE
verbose output from medusa [0-6], default=5
-w DEBUG, --debug DEBUG
debug error output from medusa [0-10], default=5

Install brutespray
sudo apt install brutespray
Remove brutespray
sudo apt remove brutespray

Depends
  • medusa - Fast, parallel, modular, login brute-forcer for network services
  • python3 - Interactive high-level object-oriented language
Recommends
  • nmap - The Network Mapper

Don’t Want to Miss Anything?

Sign up for Newsletters

* Yes, I agree to the terms and privacy policy
Top