Accéder au contenu principal

Medusa: A Speedy, Parallel And Modular Login Brute-forcing Tool


About Medusa
   Medusa is a speedy, parallel, and modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:

   Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.

   Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.

   Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.

   Multiple protocols supported. Many services are currently supported (e.g. SMB, HTTP, MS-SQL, POP3, RDP, SSHv2, among others).

   See doc/medusa.html for Medusa documentation. For additional information:

Building on macOS

#getting the source
git clone https://github.com/jmk-foofus/medusa
cd medusa

#macOS dependencies
brew install freerdp
$ export FREERDP2_CFLAGS='-I/usr/local/include'
$ export FREERDP2_LIBS='-I/usr/local/lib/freerdp'

#building
./configure
make

#executing

./src/medusa
Medusa's Installation
   Medusa is already installed on Kali Linux, Parrot Security OS, BlackArch and any other Linux distros based for security pentesting purposes.

   For Debian-based distro users, open your Terminal and enter this command:
sudo apt install medusa

   For Arch Linux-based distro users, enter this command: sudo pacman -S medusa

About the author:

You might like these similar tools:
Related news
  1. Hacker Tools 2019
  2. Hacker Tools Online
  3. Wifi Hacker Tools For Windows
  4. Game Hacking
  5. Hacking Tools For Kali Linux
  6. Tools 4 Hack
  7. Black Hat Hacker Tools
  8. Hacker Tools Software
  9. Pentest Tools Website
  10. Pentest Tools Nmap
  11. Pentest Tools For Mac
  12. Wifi Hacker Tools For Windows
  13. Pentest Tools Tcp Port Scanner
  14. Hack Tools Online
  15. Pentest Tools Nmap
  16. Hacking Tools Pc
  17. Hacker
  18. Hacker Tools For Mac
  19. Computer Hacker
  20. Hacking Tools Windows 10
  21. How To Make Hacking Tools
  22. Nsa Hack Tools
  23. Hack Tool Apk No Root
  24. Pentest Tools Download
  25. Hack Tools For Windows

Commentaires

Posts les plus consultés de ce blog

آفرینک | تماشای آنلاین انیمیشن و کارتون

https://afarinak.com/tags/%D8%A7%D9%86%DB%8C%D9%85%DB%8C%D8%B4%D9%86-%D9%87%D8%A7%DB%8C-%D8%A8%D8%B1%D9%86%D8%AF%D9%87-%D8%A7%D8%B3%DA%A9%D8%A7%D8%B1/ https://afarinak.com/tags/%D9%BE%D8%B1%D9%81%D8%B1%D9%88%D8%B4%D8%AA%D8%B1%DB%8C%D9%86-%D8%A7%D9%86%DB%8C%D9%85%DB%8C%D8%B4%D9%86-%D9%87%D8%A7%DB%8C-2016/ https://afarinak.com/tags/best-animated-movies-2017/ https://tidano.com/ https://funibo.com/ http://www.aparat.com/afarinak https://t.me/joinchat/AAAAAD67ZyQn7_qBcGjPgw https://www.instagram.com/afarinak_com/ https://twitter.com/afarinak

Biden Trolls Trump With We Just Did Merch

Here's the place where to purchase the 'we just did 46' hat that has Joe Biden fans inquisitive on Twitter. This is what it implies. There are shirts to purchase as well. We Just Did 46 Hat Official -  https://teechip.com/we-just-did-46-hat-official The expectation was through the rooftop however the outcome was at last reached on Saturday, November seventh 2020. Joe Biden has won the US official political decision and will be initiated as the 46th president on Wednesday, January twentieth 2021. His allies were celebrating and running to online media to share their contemplations over the weekend and many have just communicated their high expectations. As featured by CNN Politics, he gave a triumph discourse in his old neighborhood of Wilmington, Delaware, in any event, tending to the individuals who didn't cast a ballot him in: "I comprehend the failure today. I've