Brute forcing tools


Crowbar (brute forcing tool)

penetration testing

While most brute forcing tools take a similar approach, Crowbar can use different methods that are not always available in other utilities. For example, Crowbar can use SSH keys, instead of the typical username and password combination. This might be useful during penetration testing when these type of details are discovered.

known_hosts_bruteforcer (brute force SSH known_hosts file)

digital forensics, penetration testing

This utility is useful when you obtained a known_hosts file, but can't decipher the hashed hostnames from it.

Missing a favorite tool in this list? Share a tool suggestion and we will review it.