Skip to content

πŸ”’ This GitHub repository presents an FTP bruteforcer implemented in Python using asynchronous programming. The script automates password guessing attempts on FTP servers, leveraging the efficiency of asynchronous execution for concurrent login attempts. It provides a streamlined way to assess the security of FTP systems.

License

Notifications You must be signed in to change notification settings

calc1f4r/FTP-Bruteforcer

Repository files navigation

βš” Description

πŸ”₯ Asynchronous FTP Bruteforcer

This is a Python script that implements an asynchronous FTP (File Transfer Protocol) bruteforcer. It utilizes asynchronous programming techniques to efficiently perform password guessing attacks on FTP servers.

The FTP Bruteforcer is designed to automate the process of attempting various usernames and passwords combinations to gain unauthorized access to an FTP server. It takes advantage of the aioftp library, which provides an asynchronous FTP client implementation.

Key Features:

  • Asynchronous execution: The script leverages asyncio to achieve high concurrency and efficiency, allowing multiple login attempts to be performed simultaneously.
  • Command-line interface: The script accepts command-line arguments such as the target hostname, port, username, and wordlist file to customize the attack.
  • Password guessing: It reads a wordlist file containing potential passwords and iterates through each password, attempting to log in to the FTP server.

This is the modern approach to doing this type of thing as it uses minimal resources.

Usage To use the FTP Bruteforcer, you need to have Python 3.x installed. Additionally, you'll need to install the required dependencies, which can be done using the following command:

pip install aioftp termcolor asyncio argparse

Once the dependencies are installed, you can run the script from the command line, providing the necessary arguments:

python ftp_bruteforcer.py <target> -p <port> -u <username> -w <wordlist>

Once the dependencies are installed, you can run the script from the command line, providing the necessary arguments:

python ftp_bruteforcer.py <target> -p <port> -u <username> -w <wordlist>

Will Suggest using this script, as this uses fewer resources and works better than the other one.

Tutorial:

FTP.Bruteforce.using.Asynchronous.Programming.mp4

πŸ”₯ Multithreaded SSH and FTP Bruteforcer

This Python script is a multithreaded SSH and FTP bruteforcer. It allows for simultaneous password-guessing attempts on SSH and FTP servers using multiple threads, increasing the efficiency and speed of the brute-forcing process. The script utilizes the paramiko library for SSH connections and the ftplib library for FTP connections.

The Multithreaded SSH and FTP Bruteforcer script automate the process of attempting different username and password combinations to gain unauthorized access to SSH and FTP servers. It takes advantage of multithreading to perform concurrent brute-force attempts, significantly reducing the time required for the attack.

Key Features:

  • Support for SSH and FTP: The script can perform brute-force attacks on both SSH and FTP servers, based on the user's choice.
  • Multithreaded execution: The script uses multiple threads to perform simultaneous login attempts, increasing the speed of the brute-forcing process.
  • Command-line interface: The script accepts command-line arguments such as the target hostname, port, username, wordlist file, and the number of threads to use.

Usage

To use the Multithreaded SSH and FTP Bruteforcer, you need to have Python 3.x installed. Additionally, you'll need to install the required dependencies, which can be done using the following command:

pip install paramiko termcolor argparse ftplib

Once the dependencies are installed, you can run the script from the command line, providing the necessary arguments:

python multithread-ssh-and-Ftp-Bruteforcer.py <target> -p <port> -w <wordlist> -u <username> -t <thread> <-ssh|-ftp>
  • : The hostname or IP address of the SSH or FTP server you want to attack.
  • -p (optional): The port number to use for the SSH or FTP connection. The default is 22 for SSH and 21 for FTP if not specified.
  • -w : The path to a file containing a list of potential passwords. Each password should be on a separate line in the file.
  • -u : The username to use for the brute-forcing attempts.
  • -t (optional): The number of threads to use for concurrent brute-forcing attempts. The default is 4 if not specified. It supports up to 8 threads.
  • -ssh or -ftp: Specify either -ssh for SSH bruteforcing or -ftp for FTP bruteforcing.

Example:

multithread-ssh-and-Ftp-Bruteforcer.py 10.10.10.10 -p 22 -w passwords.txt -u admin -t 6 -ssh

About

πŸ”’ This GitHub repository presents an FTP bruteforcer implemented in Python using asynchronous programming. The script automates password guessing attempts on FTP servers, leveraging the efficiency of asynchronous execution for concurrent login attempts. It provides a streamlined way to assess the security of FTP systems.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages