Brutal_SSH
Brutal_SSH copied to clipboard
Brutal SSH: SSH Login brute force, scan for vulnerable version and 0 day exploit (under development)
Brutal_SSH
Brutal SSH: SSH Login brute force, scan for vulnerable version and 0 day exploit

Output


Requirements
- Python (2.7.*)
- Python
pip
- Python module
colorama
- Python module
argparse
- Python module
paramiko
- Python module
threading
- Python module
logging
Install modules
pip install -r requirements.txt
Tested on
- Kali linux
Download Brutal_SSH
git clone https://github.com/d3vilbug/Brutal_SSH
Usage
python brutal_SSH.py -h
Brute force password of single user
python brutal_SSH.py -i 192.168.7.128 -u msfadmin -P wordlist/passfile.txt
Brute force user and password
python brutal_SSH.py -i 192.168.7.128 -U wordlist/userfile.txt -P wordlist/passfile.txt