You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,7 @@ This is a repository of all the tutorials of [The Python Code](https://www.thepy
22
22
-[How to Brute-Force SSH Servers in Python](https://www.thepythoncode.com/article/brute-force-ssh-servers-using-paramiko-in-python). ([code](ethical-hacking/bruteforce-ssh))
23
23
-[How to Build a XSS Vulnerability Scanner in Python](https://www.thepythoncode.com/article/make-a-xss-vulnerability-scanner-in-python). ([code](ethical-hacking/xss-vulnerability-scanner))
24
24
-[How to Use Hash Algorithms in Python using hashlib](https://www.thepythoncode.com/article/hashing-functions-in-python-using-hashlib). ([code](ethical-hacking/hashing-functions/))
25
+
-[How to Brute Force FTP Servers in Python](https://www.thepythoncode.com/article/brute-force-attack-ftp-servers-using-ftplib-in-python). ([code](ethical-hacking/ftp-cracker))
host The target host or IP address of the FTP server
16
+
17
+
optional arguments:
18
+
-h, --help show this help message and exit
19
+
-u USER, --user USER The username of target FTP server
20
+
-p PASSLIST, --passlist PASSLIST
21
+
The path of the pass list
22
+
-t THREADS, --threads THREADS
23
+
Number of workers to spawn for logining, default is 30
24
+
```
25
+
- If you want to use the wordlist `wordlist.txt` in the current directory against the host `192.168.1.2` (can be domain or private/public IP address) with the user `user`:
26
+
```
27
+
python ftp_cracker.py 192.168.1.2 -u user -p wordlist.txt
28
+
```
29
+
- You can also tweak the number of threads to spawn (can be faster, default is 30):
30
+
```
31
+
python ftp_cracker.py 192.168.1.2 -u user -p wordlist.txt --threads 35
0 commit comments