A simple multi-threaded distributed SSH brute-forcing tool written in Python. How it Works When the script is executed without the --proxies switch, it acts just like any other multi-threaded SSH brute-forcing scripts. When the --proxies switch is added, the script pulls a list (usually thousands) of SOCKS4 proxies from ProxyScrape and launch all brute-force attacks over the SOCKS4 proxies so brute-force attempts will be less likely to be rate-limited by the target host. Installation You can install OrbitalDump through pip. pip install -U --user orbitaldump orbitaldump Alternatively, you can clone this repository and run the source code directly. git clone https://github.com/k4yt3x/orbitaldump.git cd orbitaldump python -m orbitaldump Usages A simple usage is shown below. This command below: -t 10: launch 10 brute-forcing threads -u usernames.txt: read usernames from usernames.txt (one username per line) -p passwords.txt: read passwords from passwords.txt (one password per line) -h example.com: set brute-forcing target to example.com --proxies: launch attacks over proxies from ProxyScrape python....
UnicodeDecodeError: ‘utf-8’ codec can’t decode byte 0xf1 in position 933
Hi, please, check out the tool repository, the issues section https://github.com/k4yt3x/orbitaldump/issues/4
Installed and ran script…Too many errors.
Hi there ! Nice-looking tool but how does this tool perform better than Hydra, Nmap’s NSE script ssh-brute, Metasploit’s auxiliary module, SSB, Patator, Ncrack or any of the various other tools we can find ?