BruteSpray: To Bruteforce from Nmap Outputs
BruteSpray takes nmap GNMAP/XML output and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside Nmap. Usage: Using Custom Wordlists: python brutespray.py –file nmap.gnmap -U /usr/share/wordlist/user.txt -P /usr/share/wordlist/pass.txt –threads 5 –hosts 5 Brute-Forcing Specific Services: python brutespray.py –file nmap.gnmap –service ftp,ssh,telnet –threads 5 –hosts 5 […]