Brute forcing tools


Popular brute forcing tools

Crowbar (brute forcing tool)

penetration testing

While most brute forcing tools take a similar approach, Crowbar can use different methods that are not always available in other utilities. For example, Crowbar can use SSH keys, instead of the typical username and password combination. This might be useful during penetration testing when these type of details are discovered.

known_hosts_bruteforcer (brute force SSH known_hosts file)

digital forensics, penetration testing

This utility is useful when you obtained a known_hosts file, but can't decipher the hashed hostnames from it.

Missing a favorite tool in this list? Share a tool suggestion and we will review it.

Related topics

Looking for more specific topics within this tool group? Have a look at the following relevant topics.