/dports/security/nmap/nmap-7.91/scripts/ |
H A D | http-wordpress-brute.nse | 1 local brute = require "brute" 8 performs brute force password auditing against Wordpress CMS/blog installations. 21 -- nmap -sV --script http-wordpress-brute <target> 22 -- nmap -sV --script http-wordpress-brute 24 -- http-wordpress-brute.threads=3,brute.firstonly=true' <target> 29 -- | http-wordpress-brute: 47 -- * brute.mode = user/creds/pass - Username password iterator 51 -- @see http-form-brute.nse 55 categories = {"intrusive", "brute"} 78 Host = stdnse.get_script_args('http-wordpress-brute.hostname') [all …]
|
H A D | cvs-brute.nse | 1 local brute = require "brute" 13 -- nmap -p 2401 --script cvs-brute <host> 17 -- | cvs-brute: 24 -- @args cvs-brute.repo string containing the name of the repository to brute 28 -- brute force the credentials for the first one. 36 categories = {"intrusive", "brute"} 37 dependencies = {"cvs-brute-repository"} 53 self.helper:connect(brute.new_socket()) 66 local err = brute.Error:new("Account invalid") 91 { stdnse.get_script_args("cvs-brute.repo") } or [all …]
|
H A D | http-joomla-brute.nse | 1 local brute = require "brute" 9 Performs brute force password auditing against Joomla web CMS installations. 23 -- nmap -sV --script http-joomla-brute 25 -- http-joomla-brute.threads=3,brute.firstonly=true' <target> 26 -- nmap -sV --script http-joomla-brute <target> 31 -- | http-joomla-brute: 38 -- @args http-joomla-brute.hostname Virtual Hostname Header 48 -- * brute.mode = user/creds/pass - Username password iterator 53 -- @see http-form-brute.nse 57 categories = {"intrusive", "brute"} [all …]
|
H A D | ftp-brute.nse | 1 local brute = require "brute" 8 Performs brute force password auditing against FTP servers. 17 -- nmap --script ftp-brute -p 21 <host> 19 -- This script uses brute library to perform password 25 -- | ftp-brute: 38 categories = {"intrusive", "brute"} 57 self.socket = brute.new_socket() 75 return false, brute.Error:new( "Incorrect password" ) 77 local err = brute.Error:new("Too many connections") 82 local err = brute.Error:new("Unhandled response") [all …]
|
H A D | script.db | 3 Entry { filename = "afp-brute.nse", categories = { "brute", "intrusive", } } 9 Entry { filename = "ajp-brute.nse", categories = { "brute", "intrusive", } } 18 Entry { filename = "backorifice-brute.nse", categories = { "brute", "intrusive", } } 82 Entry { filename = "cvs-brute.nse", categories = { "brute", "intrusive", } } 88 Entry { filename = "dicom-brute.nse", categories = { "auth", "brute", } } 111 Entry { filename = "domcon-brute.nse", categories = { "brute", "intrusive", } } 114 Entry { filename = "dpap-brute.nse", categories = { "brute", "intrusive", } } 115 Entry { filename = "drda-brute.nse", categories = { "brute", "intrusive", } } 132 Entry { filename = "ftp-brute.nse", categories = { "brute", "intrusive", } } 168 Entry { filename = "http-brute.nse", categories = { "brute", "intrusive", } } [all …]
|
H A D | informix-brute.nse | 1 local brute = require "brute" 9 Performs brute force password auditing against IBM Informix Dynamic Server. 14 -- nmap --script informix-brute -p 9088 <host> 19 -- | informix-brute: 38 categories = {"intrusive", "brute"} 62 status, data = self.helper:Connect(brute.new_socket()) 75 -- @return brute.Error object on failure 81 if ( not(nmap.registry['informix-brute']) ) then 82 nmap.registry['informix-brute'] = {} 91 return false, brute.Error:new( data ) [all …]
|
H A D | nje-pass-brute.nse | 4 local brute = require "brute" 11 z/OS JES Network Job Entry (NJE) 'I record' password brute forcer. 16 brute forces the password. 19 <code>brute.firstonly</code> script argument. 28 -- @args nje-pass-brute.ohost The target NJE server OHOST value. 30 -- @args nje-pass-brute.rhost The target NJE server RHOST value. 38 -- | nje-pass-brute: 48 categories = {"intrusive", "brute"} 119 return false, brute.Error:new( "Invalid Password" ) 134 …alse, "No OHOST or RHOST set. Use --script-args nje-node-brute.rhost=\"<rhost>\",nje-node-brute.oh… [all …]
|
H A D | iscsi-brute.nse | 1 local brute = require "brute" 8 Performs brute force password auditing against iSCSI targets. 12 -- @args iscsi-brute.target iSCSI target to brute-force. 16 -- | iscsi-brute: 29 categories = {"intrusive", "brute"} 41 o.target = stdnse.get_script_args('iscsi-brute.target') 47 return self.helper:connect(brute.new_socket()) 57 return false, brute.Error:new( "Incorrect password" ) 68 local target = stdnse.get_script_args('iscsi-brute.target') 70 return stdnse.format_output(false, "No target specified (see iscsi-brute.target)") [all …]
|
H A D | ipmi-brute.nse | 1 local brute = require "brute" 8 Performs brute force password auditing against IPMI RPC server. 13 -- nmap -sU --script ipmi-brute -p 623 <host> 18 -- | ipmi-brute: 25 categories = {"intrusive", "brute"} 41 self.socket = brute.new_socket() 60 return false, brute.Error:new( 80 return false, brute.Error:new("No response to RAKP1 message") 89 return false, brute.Error:new( 109 return false, brute.Error:new("Incorrect password") [all …]
|
H A D | oracle-brute.nse | 1 local brute = require "brute" 33 -- @see oracle-brute-stealth.nse 36 -- nmap --script oracle-brute -p 1521 --script-args oracle-brute.sid=ORCL <host> 41 -- | oracle-brute: 57 -- - oracle-brute.sid argument 73 categories = {"intrusive", "brute"} 137 -- @return brute.Error object on failure 160 return false, brute.Error:new(data) 165 local err = brute.Error:new(data) 170 return false, brute.Error:new( data ) [all …]
|
H A D | nessus-brute.nse | 1 local brute = require "brute" 12 -- nmap --script nessus-brute -p 1241 <host> 17 -- | nessus-brute: 34 categories = {"intrusive", "brute"} 50 self.socket = brute.new_socket() 62 local err = brute.Error:new( "Failed to send handshake to server" ) 84 local err = brute.Error:new( "Failed to send username to server" ) 98 local err = brute.Error:new( "Failed to send password to server" ) 127 return false, brute.Error:new( "Incorrect password" ) 134 return false, brute.Error:new( "Incorrect password" ) [all …]
|
H A D | openvas-otp-brute.nse | 1 local brute = require "brute" 18 -- | openvas-otp-brute: 24 -- @args openvas-otp-brute.threads sets the number of threads. Default: 4 30 categories = {"intrusive", "brute"} 45 self.socket = brute.new_socket() 56 local err = brute.Error:new( "Unable to send handshake" ) 71 local err = brute.Error:new( "Couldn't send user: "..username ) 78 local err = brute.Error:new( "Couldn't send password: "..password ) 89 return false, brute.Error:new( "Bad login" ) 97 return false, brute.Error:new( "unhandled response" ) [all …]
|
H A D | rsync-brute.nse | 1 local brute = require "brute" 9 Performs brute force password auditing against the rsync remote file syncing protocol. 14 -- nmap -p 873 --script rsync-brute --script-args 'rsync-brute.module=www' <ip> 19 -- | rsync-brute: 26 -- @args rsync-brute.module - the module against which brute forcing should be performed 32 categories = {"brute", "intrusive"} 47 return self.helper:connect(brute.new_socket()) 55 local err = brute.Error:new( data ) 59 return false, brute.Error:new( "Login failed" ) 97 return fail("rsync-brute.module was not supplied") [all …]
|
H A D | ssh-brute.nse | 3 local brute = require "brute" 9 Performs brute-force password guessing against ssh servers. 15 -- --script-args ssh-brute.timeout=4s <target> 19 -- | ssh-brute: 25 -- @args ssh-brute.timeout Connection timeout (default: "5s") 30 'brute', 40 stdnse.debug(2, "creating brute driver") 56 local err = brute.Error:new(self.helper.session) 61 local err = brute.Error:new(err) 76 return false, brute.Error:new "Incorrect password" [all …]
|
H A D | mysql-brute.nse | 1 local brute = require "brute" 18 -- nmap --script=mysql-brute <target> 22 -- | mysql-brute: 26 -- @args mysql-brute.timeout socket timeout for connecting to MySQL (default 5s) 30 categories = {"intrusive", "brute"} 37 -- Revised 05/25/2012 - v0.5 - revised by Aleksandar Nikolic, rewritten to use brute lib 56 self.socket = brute.new_socket() 60 return false, brute.Error:new( "Couldn't connect to host: " .. err ) 68 return false,brute.Error:new(response) 80 return false,brute.Error:new( "Incorrect password" ) [all …]
|
H A D | nexpose-brute.nse | 1 local brute = require "brute" 10 Performs brute force password auditing against a Nexpose vulnerability scanner 15 altered by supplying the <code>brute.guesses</code> argument a different 21 -- nmap --script nexpose-brute -p 3780 <ip> 26 -- | nexpose-brute: 37 categories = {"intrusive", "brute"} 58 local err = brute.Error:new( "Couldn't send/receive HTTPS request" ) 65 return false, brute.Error:new( "Bad login" ) 71 return false, brute.Error:new( "incorrect response from server" ) 78 local engine = brute.Engine:new(Driver, host, port) [all …]
|
H A D | rlogin-brute.nse | 1 local brute = require "brute" 9 Performs brute force password auditing against the classic UNIX rlogin (remote 16 -- nmap -p 513 --script rlogin-brute <ip> 21 -- | rlogin-brute: 35 categories = {"brute", "intrusive"} 39 -- The rlogin Driver, check the brute.lua documentation for more details 59 self.socket = brute.new_socket() 98 local err = brute.Error:new( "Expected null byte" ) 111 local err = brute.Error:new( "Expected password prompt" ) 132 return false, brute.Error:new( "Incorrect password" ) [all …]
|
H A D | rexec-brute.nse | 1 local brute = require "brute" 12 -- nmap -p 512 --script rexec-brute <ip> 17 -- | rexec-brute: 23 -- @args rexec-brute.timeout socket timeout for connecting to rexec (default 10s) 31 categories = {"brute", "intrusive"} 35 --- Copied from telnet-brute 64 self.socket = brute.new_socket() 68 local err = brute.Error:new("Connection failed") 81 local err = brute.Error:new("Send failed") 91 return false, brute.Error:new( "Incorrect password" ) [all …]
|
H A D | cassandra-brute.nse | 1 local brute = require "brute" 10 Performs brute force password auditing against the Cassandra database. 18 -- nmap -p 9160 <ip> --script=cassandra-brute 23 -- | cassandra-brute: 32 categories = {"intrusive", "brute"} 39 local o = { host = host, port = port, socket = brute.new_socket() } 57 local err = brute.Error:new( "couldn't send length:"..combo ) 85 return false, brute.Error:new( "Incorrect password" ) 88 return false, brute.Error:new( "Good user, bad password" ) 94 local err = brute.Error:new( response ) [all …]
|
H A D | http-brute.nse | 1 local brute = require "brute" 12 This script uses the unpwdb and brute libraries to perform password 19 -- nmap --script http-brute -p 80 <host> 24 -- | http-brute: 31 -- @args http-brute.hostname sets the host header in case of virtual hosting 32 -- @args http-brute.method sets the HTTP method to use (default: <code>GET</code>) 56 categories = {"intrusive", "brute"} 67 o.hostname = stdnse.get_script_args("http-brute.hostname") 106 local err = brute.Error:new(response["status-line"]) 117 return false, brute.Error:new( "Incorrect password" ) [all …]
|
H A D | vnc-brute.nse | 1 local brute = require "brute" 8 Performs brute force password auditing against VNC servers. 20 -- nmap --script vnc-brute -p 5900 <host> 25 -- | vnc-brute: 43 categories = {"intrusive", "brute"} 69 -- @return brute.Error object on failure 76 local err = brute.Error:new( data ) 80 local err = brute.Error:new( "VNC handshake failed" ) 91 local err = brute.Error:new( data ) 97 return false, brute.Error:new( "Incorrect password" ) [all …]
|
H A D | mongodb-brute.nse | 1 local brute = require "brute" 10 Performs brute force password auditing against the MongoDB database. 15 -- nmap -p 27017 <ip> --script mongodb-brute 17 -- @args mongodb-brute.db Database against which to check. Default: admin 22 -- | mongodb-brute: 32 categories = {"intrusive", "brute"} 41 local o = { host = host, port = port, sock = brute.new_socket() } 56 local err = brute.Error:new( resp ) 60 return false, brute.Error:new( "Incorrect password" ) 101 local engine = brute.Engine:new(Driver, host, port )
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/yggdrasil-network/yggdrasil-go/contrib/yggdrasil-brute-simple/ |
H A D | Makefile | 3 all: util yggdrasil-brute-multi-curve25519 yggdrasil-brute-multi-ed25519 8 yggdrasil-brute-multi-ed25519: yggdrasil-brute-multi-ed25519.c util.o 9 …gcc -Wall -std=c89 -O3 -o yggdrasil-brute-multi-ed25519 -lsodium yggdrasil-brute-multi-ed25519.c u… 11 yggdrasil-brute-multi-curve25519: yggdrasil-brute-multi-curve25519.c util.o 12 …gcc -Wall -std=c89 -O3 -o yggdrasil-brute-multi-curve25519 -lsodium yggdrasil-brute-multi-curve255…
|
/dports/net/yggdrasil/yggdrasil-go-0.3.11/contrib/yggdrasil-brute-simple/ |
H A D | Makefile | 3 all: util yggdrasil-brute-multi-curve25519 yggdrasil-brute-multi-ed25519 8 yggdrasil-brute-multi-ed25519: yggdrasil-brute-multi-ed25519.c util.o 9 …gcc -Wall -std=c89 -O3 -o yggdrasil-brute-multi-ed25519 -lsodium yggdrasil-brute-multi-ed25519.c u… 11 yggdrasil-brute-multi-curve25519: yggdrasil-brute-multi-curve25519.c util.o 12 …gcc -Wall -std=c89 -O3 -o yggdrasil-brute-multi-curve25519 -lsodium yggdrasil-brute-multi-curve255…
|
/dports/archivers/zip-ada/zip-ada/tools/ |
H A D | pack_za_bin.cmd | 10 upx --ultra-brute comp_zip.exe 11 upx --ultra-brute find_zip.exe 12 upx --ultra-brute rezip.exe 13 upx --ultra-brute unzipada.exe 14 upx --ultra-brute zipada.exe 15 upx --ultra-brute bunzip.exe 16 upx --ultra-brute lzma_dec.exe 17 upx --ultra-brute lzma_enc.exe
|