.. /Patator
Quick Usage
For this tool the run command is:
docker run -it --rm -v <wordlist_src_dir>:<wordlist_container_dir> lanjelot/patator <wordlist_container_dir>/<wordlist_file>Categories
cracker
Description
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
Currently it supports the following modules:
ftp_login: Brute-force FTPssh_login: Brute-force SSHtelnet_login: Brute-force Telnetsmtp_login: Brute-force SMTPsmtp_vrfy: Enumerate valid users using SMTP VRFYsmtp_rcpt: Enumerate valid users using SMTP RCPT TOfinger_lookup: Enumerate valid users using Fingerhttp_fuzz: Brute-force HTTPajp_fuzz: Brute-force AJPpop_login: Brute-force POP3pop_passd: Brute-force poppassd (http://netwinsite.com/poppassd/)imap_login: Brute-force IMAP4ldap_login: Brute-force LDAPdcom_login: Brute-force DCOMsmb_login: Brute-force SMBsmb_lookupsid: Brute-force SMB SID-lookuprlogin_login: Brute-force rloginvmauthd_login: Brute-force VMware Authentication Daemonmssql_login: Brute-force MSSQLmysql_login: Brute-force MySQLmysql_query: Brute-force MySQL queriesrdp_login: Brute-force RDP (NLA)pgsql_login: Brute-force PostgreSQLvnc_login: Brute-force VNCdns_forward: Forward DNS lookupdns_reverse: Reverse DNS lookupsnmp_login: Brute-force SNMP v1/2/3ike_enum: Enumerate IKE transformsunzip_pass: Brute-force the password of encrypted ZIP fileskeystore_pass: Brute-force the password of Java keystore filesumbraco_crack: Crack Umbraco HMAC-SHA1 password hashestcp_fuzz: Fuzz TCP servicesdummy_test: Testing module
Official Documentation
Reference: https://github.com/lanjelot/patator
