BruteDum : Brute Force Attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack

BruteDum is a SSH, FTP, Telnet, PostgreSQL, RDP, VNC brute forcing tool with Hydra, Medusa and Ncrack. It can work with any Linux distros if they have Python 3.

Features

  • SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra (recommended)
  • SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Medusa
  • SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Ncrack
  • Scan victim’s ports with Nmap

Also Read – AutoSource : Automated Source Code SonarQube

Install & Run on Linux

You have to install Python 3 first:

  • Install Python 3 on Arch Linux and its distros: sudo pacman -S python3
  • Install Python 3 on Debian and its distros: sudo apt install python3

You have to install Hydra, Medusa, Nmap and Ncrack too:

  • On Arch Linux and its distros: sudo pacman -S nmap hydra medusa ncrack
  • On Debian and its distros: sudo apt install nmap hydra medusa ncrack

git clone https://github.com/GitHackTools/BruteDum
cd BruteDum
python3 brutedum.py

Screenshots

Menu of tools
Scanning victim’s ports with Nmap
Ready to brute force
Brute force has done

Video Demo

R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

21 minutes ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

21 hours ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

23 hours ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

1 day ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

1 day ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

1 day ago