Metadata-Version: 2.1
Name: patator
Version: 1.0
Summary: multi-purpose brute-forcer
Home-page: https://github.com/lanjelot/patator
Author: Sebastien Macke
Author-email: patator@hsc.fr
License: GPLv2
Keywords: pentest brute force password attack
Classifier: Development Status :: 4 - Beta
Classifier: Environment :: Console
Classifier: Intended Audience :: Developers
Classifier: Intended Audience :: System Administrators
Classifier: Intended Audience :: Information Technology
Classifier: License :: OSI Approved :: GNU General Public License v2 (GPLv2)
Classifier: Programming Language :: Python :: 3
Classifier: Operating System :: Microsoft :: Windows
Classifier: Operating System :: POSIX :: Linux
Classifier: Topic :: Utilities
Classifier: Topic :: Security
Requires-Python: >=2.7, !=3.0.*, !=3.1.*, !=3.2.*, <4
License-File: LICENSE
Requires-Dist: paramiko
Requires-Dist: pycurl
Requires-Dist: ajpy
Requires-Dist: impacket
Requires-Dist: pyopenssl
Requires-Dist: mysqlclient
Requires-Dist: psycopg2-binary
Requires-Dist: pycryptodomex
Requires-Dist: dnspython
Requires-Dist: IPy
Requires-Dist: pysnmp==4.4.12
Requires-Dist: pyasn1>=0.4.8
Requires-Dist: pysqlcipher3

Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors.
