Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Scan4all | 4,018 | 4 days ago | 9 | April 08, 2022 | 2 | bsd-3-clause | Go | |||
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)... | ||||||||||
Denyhosts | 624 | 12 hours ago | 67 | gpl-2.0 | Python | |||||
Automated host blocking from SSH brute force attacks | ||||||||||
Wbruter | 497 | 3 months ago | gpl-3.0 | Shell | ||||||
wbruter was the first tool wich has been released as open source wich can guarantee 100% that your pin code will be cracked aslong as usb debugging has been enable. wbruter also includes some other brute methods like dictionary attacks for gmail, ftp, rar, zip and some other file extensions. | ||||||||||
Honeypot | 349 | 3 years ago | 2 | JavaScript | ||||||
Low interaction honeypot that displays real time attacks | ||||||||||
Known_hosts Hashcat | 229 | 5 years ago | Python | |||||||
A guide and tool for cracking ssh known_hosts files with hashcat | ||||||||||
Dheater | 154 | 5 months ago | 2 | apache-2.0 | Python | |||||
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. | ||||||||||
Kali Linux Tools Interface | 141 | 2 years ago | 2 | mit | PHP | |||||
Graphical Web interface developed to facilitate the use of security information tools. | ||||||||||
Ssh_user_enum | 65 | 7 years ago | 1 | agpl-3.0 | Python | |||||
SSH User Enumeration Script in Python Using The Timing Attack | ||||||||||
Ids Evasion | 59 | 2 years ago | Python | |||||||
Evading Snort Intrusion Detection System. | ||||||||||
Ssh Putty Login Bruteforcer | 51 | 3 years ago | other | PowerShell | ||||||
Turn PuTTY into an SSH login bruteforcing tool. |
ssh_enum_v0.3.py Usage: ssh_enum_v0.3.py [options]
Options:
-h, --help Show this help message and exit -u --userlist Specify a new line delimited username file -i --ip Specify the target -m --multiplier Specify the multiplier for the password (used to cause the delay) -t --threshold Adjust the threshold according to the multipler -p --port Specify a port if the SSH service is not running on port 22 -a --autotune Calculate the optimum delay/threshold
Tips
Running the script with just userlist and host arguments will use defaults. This will work but may not be optimal.
Running the script with autotune will attempt to find the ideal multiplier and appropriate threshold: ssh_enum_v0.3.py -u users.txt -i 192.168.0.1 -a
After the autotune mode has finished, it will display the multiplier and threshold. These values can be used for subsequent attacks against the same hsot: ssh_enum_v0.3.py - users.txt -i 192.168.0.1 -m 4000 -t 8