MongoBuster : Hunt Open MongoDB Instances

MongoBuster is a hunt open mongoDB instances. Following are the features that are associated with this.

  • Worlds fastest and most efficient scanner ( Uses Masscan ).
  • Scans entire internet by default, So fire the tool and chill.
  • Hyper efficient – Uses Go-routines which are even lighter than threads.

Also Read – Monitor Smartphone usage with Cocospy Keylogger

Pre-Requisites

  • Go language ( sudo apt install golang )
  • Masscan ( sudo apt install masscan )
  • Tested on Ubuntu & Kali linux

How to install and run

git clone https://github.com/yashpl/mongoBuster.git
cd mongoBuster
go build mongobuster.go utils.go
sudo ./mongobuster

Note: Run it with sudo as Masscan requires sudo access.

Flags

FlagDescription
–max-rate= (int)Defines maximum rate at which packets are generated and sent. Default is 100.
–out-file= (string)Name of file to which vulnerable IPs will be exported.
-vDisplay error msgs from non-vulnerable servers

NOTE

Using ridiculous values for max-rate flag like 10000+ will most likely bring down your own network infrastructure.

Recommended value is to start with --max-rate 500 for consumer Gigabit routers.

R K

Recent Posts

Cybersecurity Toolkit – Essential Python Tools For Penetration Testing

Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing…

15 hours ago

i-Haklab : Unleashing The Power Of Termux For Enhanced Cybersecurity

The main objective of the creation of this laboratory is to transport the applications, tools…

15 hours ago

Dark FB – A Comprehensive Toolkit For Advanced Facebook Interactions

"Dark FB" is a powerful toolkit designed for those who wish to delve deeper into…

15 hours ago

Wifi-Hacking.py : Your Ultimate Guide To Ethical WiFi Penetration Testing

Unlock the potential of ethical hacking with Wifi-Hacking.py, a powerful cybersecurity tool designed to navigate…

2 days ago

THREAT ACTORS – TTPs : Decoding The Digital Underworld Through Comprehensive Mapping

This repository was created with the aim of assisting companies and independent researchers about Tactics,…

2 days ago

MagicDot : Harnessing DOT-To-NT Path Conversion For Rootkit-Like Capabilities

A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path…

2 days ago