Updates Potator v-0.7 :  is a multi-purpose brute-forcer, with a modular design and a flexible usage.

Updates Potator v-0.7 : is a multi-purpose brute-forcer, with a modular design and a flexible usage.

Changelog v-0.7(26/04/2015):
+ added support for PyInstaller on Windows
+ fixed line breaks

Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors.

* No false negatives, as it is the user that decides what results to ignore based on:
+ status code of response
+ size of response
+ matching string or regex in response data
+ … see –help
* Modular design
+ not limited to network modules (eg. the unzip_pass module)
+ not limited to brute-forcing (eg. remote exploit testing, or vulnerable version probing)
* Interactive runtime
+ show progress during execution (press Enter)
+ pause/unpause execution (press p)
+ increase/decrease verbosity
+ add new actions & conditions during runtime (eg. to exclude more types of response from showing)
+ … press h to see all available interactive commands

* Use persistent connections (ie. will test several passwords until the server disconnects)
* Multi-threaded
* Flexible user input
– Any module parameter can be fuzzed:
+ use the FILE keyword to iterate over a file
+ use the COMBO keyword to iterate over a combo file
+ use the NET keyword to iterate over every hosts of a network subnet
+ use the RANGE keyword to iterate over hexadecimal, decimal or alphabetical ranges
+ use the PROG keyword to iterate over the output of an external program

– Iteration over the joined wordlists can be done in any order

* Save every response (along with request) to seperate log files for later reviewing

Currently it supports the following modules:

Example Screen captute Module run on windows with python 2.7.9

Example Screen capture running Module on windows Vista/7/8 with python 2.7.9

Usage Examples :
FTP : Enumerating users denied login in vsftpd/userlist

SSH : Time-based user enumeration

PyInstaller :
Bundling on Windows :

Install python-2.7.9.msi from Python.
Install pywin32-219.win32-py2.7.exe from PyWin32.
Install vcredist_x86.exe from Microsoft.
Install Git-1.9.5.exe from Git (and select “Use Git from Windows Command Prompt” during install).
Add c:\Python27;c:\Python27\Scripts to your PATH.

Download : potator-master.zip (42.6 KB)  | or Clone Url
Source : https://github.com/lanjelot Our Post Before