Brute forcing tools
Tools
Popular brute forcing tools
Crowbar (brute forcing tool)
penetration testing
While most brute forcing tools take a similar approach, Crowbar can use different methods that are not always available in other utilities. For example, Crowbar can use SSH keys, instead of the typical username and password combination. This might be useful during penetration testing when these type of details are discovered.
known_hosts_bruteforcer (brute force SSH known_hosts file)
digital forensics, penetration testing
This utility is useful when you obtained a known_hosts file, but can't decipher the hashed hostnames from it.
Missing a favorite tool in this list? Share a tool suggestion and we will review it.