IMAP

Patator

Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors. More information about Patator https://github.com/lanjelot/patator

THC-Hydra 8.6

Hydra is born more than 10 years ago, this page is used as a recap of the functionalities it provides, but also the differences in feature sets, services coverage and code between the most popular network authentication cracker tools available. Each feature is compared against Hydra as of the current version. This table is updated as new features are added to the project. If you find any inaccuracies on this page please do not hesitate to contact us. [0x00] News and Changelog Check out the feature sets and services coverage page – including a speed comparison against ncrack and medusa (yes, we […]

Crear una tarea programada que se encarga de enviar un mail a una hora en concreto si se encuentra un valor en una tabla de MySQL

En primer lugar, crear el script que se conecta a una base de datos de MySQL y hace una consulta para ver si existe un elemento dentro de una tabla, si existe se encarga de enviar un mail

En segundo lugar crear una tarea programada que llama al script

Enviar ofertas de trabajo por correo electrónico

 

THC-Hydra

Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast. Hydra was tested to compile on Linux, Windows/Cygwin, Solaris 11, FreeBSD 8.1, OpenBSD, OSX, QNX/Blackberry, and is made available under GPLv3 with a special OpenSSL license expansion. Currently this tool supports: Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, […]

Deleting a file or folder (or other type of object)

The Remove-Item cmdlet does exactly what the name implies: it enables you to get rid of things once and for all. Tired of the file C:\Scripts\Test.txt? Then delete it:

  You can also use wildcard characters to remove multiple items. For example, this command removes all the files in C:\Scripts:

  There is one catch, however. Suppose C:\Scripts contains subfolders. In that case, you’ll be prompted as to whether or not you really do want to delete everything in the Scripts folder:

  Is there a way to bypass this prompt? Yep; just tack the -recurse parameter […]

SoftPerfect Network Protocol Analyzer

SoftPerfect Network Protocol Analyzer is a free professional tool for analysing, debugging, maintaining and monitoring local networks and Internet connections. It captures the data passing through the dial-up connection or Ethernet network card, analyses this data and then represents it in a readable form. This is a useful tool for network administrators, security specialists, network application developers and anyone who needs a comprehensive picture of the traffic passing through their network connection or a segment of a local area network. SoftPerfect Network Protocol Analyzer presents the results of its analysis in a convenient and easily understandable format. It can defragment […]