Brutespray – Port Scanning and Automated Brute Force Tool

Premium Member
Joined
April 6, 2025
Messages
169
Reaction score
67
Points
28


Installation of Brutespray Tool on Kali Linux OS​

Step 1: Use the following command to install the tool in your Kali Linux operating system.

git clone GitHub - x90skysn3k/brutespray: Bruteforcing from various scanner output - Automatically attempts default creds on found services.
Brutespray – Port Scanning and Automated Brute Force Tool


Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.

cd brutespray
Step2.png


Step 3: You are in the directory of the Brutespray. Now you have to install a dependency of the Brutespray using the following command.

sudo pip3 install -r requirements.txt
Brutespray – Port Scanning and Automated Brute Force Tool


Step 4: All the dependencies have been installed in your Kali Linux operating system. Now use the following command to run the tool and check the help section.

python3 brutespray.py -h
Brutespray – Port Scanning and Automated Brute Force Tool


Working with Brutespray Tool on Kali Linux OS​

Example 1: Using Custom Wordlists

python3 brutespray.py –file results.gnmap -U user.txt -P pass.txt –threads 5 –hosts 5
In this example, we are using the custom word-lists to perform Brute-Forcing on the target domain.

Brutespray – Port Scanning and Automated Brute Force Tool
Example12.png
Example13min.png


Example 2: Brute-Forcing Specific Services

python3 brutespray.py –file results.gnmap –service ftp,ssh,telnet –threads 5 –hosts 5
In this example, we are only going to perform brute-forcing on ftp,ssh and telnet service.

Brutespray – Port Scanning and Automated Brute Force Tool
Example22min.png


Example 3: Specific Credentials/ Brute-Forcing Username and Password

python3 brutespray.py –file results.gnmap -u admin -p password –threads 5 –hosts 5
In this example, we will be brute-forcing with single or specified credentials.

Brutespray – Port Scanning and Automated Brute Force Tool
Example32min.png


Example 4: Continue After Success

python3 brutespray.py –file results.gnmap –threads 5 –hosts 5 -c
In this example, we will be continuing over brute-forcing attack after success also.

Brutespray – Port Scanning and Automated Brute Force Tool
Example42min.png


Example 5: Use Nmap XML Output

python3 brutespray.py --file results.xml --threads 5 --hosts 5
In this example, we will be using the XML file for scanning and brute-forcing.

Example51min.png
Example52.png
Example53min.png


Example 6: Brutespray Interactive Mode

python3 brutespray.py --file results.xml -i
In this example, we will be using the interactive mode of the tool Brutespray.

Brutespray – Port Scanning and Automated Brute Force Tool
Brutespray – Port Scanning and Automated Brute Force Tool
Example63min.png




 
  • Tags
    brute scanning tool
  • Top