Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors. More information about Patator https://github.com/lanjelot/patator

THC-Hydra 8.6

Hydra is born more than 10 years ago, this page is used as a recap of the functionalities it provides, but also the differences in feature sets, services coverage and code between the most popular network authentication cracker tools available. Each feature is compared against Hydra as of the current version. This table is updated as new features are added to the project. If you find any inaccuracies on this page please do not hesitate to contact us. [0x00] News and Changelog Check out the feature sets and services coverage page – including a speed comparison against ncrack and medusa (yes, we […]

5. Gestión del software en PowerShell (nivel intermedio)

El software es la parte que no se puede tocar del ordenador (intangible), es un elemento lógico y se define como un conjunto de órdenes e instrucciones que al ejecutarse sirven para realizar alguna tarea (los programas sin ejecutar son simples archivos en disco). Con el software se saca partido al ordenador, sin software el ordenador sería un conjunto de placas, tarjetas y cables sin ninguna utilidad. Los sistemas operativos instalados programas pero también se pueden instalar otros. El software se puede dividir en tipos: Software de sistema. Conjunto de programas que administran los recursos del ordenador. Software de programación. […]

File System Security PowerShell Module 3.2.3

Source are available on CodePlex https://ntfssecurity.codeplex.com/ Download https://gallery.technet.microsoft.com/scriptcenter/1abd77a5-9c0b-4a2b-acef-90dbb2b84e85/file/48905/1/NTFSSecurity%201.3.zip Introduction Managing permissions with PowerShell is only a bit easier than in VBS or the command line as there are no cmdlets for most day-to-day tasks like getting a permission report or adding permission to an item. PowerShell only offers Get-Acl and Set-Acl but everything in between getting and setting the ACL is missing. This module closes the gap. Documentation For documentation plese refer to: NTFSSecurity Tutorial 1 – Getting, adding and removing permissions NTFSSecurity Tutorial 2 – Managing NTFS Inheritance and Using Privileges Comments, feature requests and bug reports are very […]


Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast. Hydra was tested to compile on Linux, Windows/Cygwin, Solaris 11, FreeBSD 8.1, OpenBSD, OSX, QNX/Blackberry, and is made available under GPLv3 with a special OpenSSL license expansion. Currently this tool supports: Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP, […]

Sistemas operativos monopuesto

Índice Introducción a los sistemas informáticos Introducción a los sistemas operativos Instalación de sistemas operativos Configuración de máquinas virtuales Virtualización Definición Características Tipos de virtualización Ventajas e inconvenientes Máquinas virtuales Definición Características Ventajas e inconvenientes Software para crear máquinas virtuales Creación y configuración de máquinas virtuales Instalación de un sistema operativo en una máquina virtual Tareas básicas I Introducción Interfaces Modo texto Modo gráfico Utilidades del sistema Explorador de archivos La búsqueda Ejecutar Otras aplicaciones Tareas básicas II Introducción a los sistemas de archivos Archivos Tipos Propiedades Operaciones Directorios Propiedades Estructura Operaciones Tareas de administración I Introducción Agregar/Eliminar software Introducción […]