All Projects → petercunha → Knock

petercunha / Knock

Licence: MIT license
🔑 Scan the entire internet for SSH and Telnet services. Then hack them.

Programming Languages

javascript
184084 projects - #8 most used programming language

Projects that are alternatives of or similar to Knock

uberscan
Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.
Stars: ✭ 31 (-48.33%)
Mutual labels:  brute-force, password-cracker
phpmyadmin-authentication-bruteforce
phpMyAdmin Authentication Bruteforce Tool
Stars: ✭ 58 (-3.33%)
Mutual labels:  brute-force, password-cracker
Brutedum
BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack
Stars: ✭ 212 (+253.33%)
Mutual labels:  telnet, brute-force
password-list
Password lists with top passwords to optimize bruteforce attacks
Stars: ✭ 174 (+190%)
Mutual labels:  brute-force, password-cracker
Thc Hydra
hydra
Stars: ✭ 5,645 (+9308.33%)
Mutual labels:  brute-force, password-cracker
Pydictor
A powerful and useful hacker dictionary builder for a brute-force attack
Stars: ✭ 2,055 (+3325%)
Mutual labels:  brute-force, password-cracker
Shodan-RPi
A simple SSH bruteforce script targeting (not necessarily) Raspbian devices.
Stars: ✭ 13 (-78.33%)
Mutual labels:  shodan, brute-force
Bugbounty Starter Notes
bug bounty hunters starter notes
Stars: ✭ 85 (+41.67%)
Mutual labels:  shodan
Penta
Open source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (+116.67%)
Mutual labels:  shodan
Shodanz
🔭 A modern, async Ruby gem for Shodan, the world's first search engine for Internet-connected devices.
Stars: ✭ 74 (+23.33%)
Mutual labels:  shodan
Kill Router
Ferramenta para quebrar senhas administrativas de roteadores Wireless, routers, switches e outras plataformas de gestão de serviços de rede autenticados.
Stars: ✭ 57 (-5%)
Mutual labels:  shodan
Osint San
Framework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.​
Stars: ✭ 99 (+65%)
Mutual labels:  shodan
Pigat
pigat ( Passive Intelligence Gathering Aggregation Tool ) 被动信息收集聚合工具
Stars: ✭ 140 (+133.33%)
Mutual labels:  shodan
Jenkins Shell
Automating Jenkins Hacking using Shodan API
Stars: ✭ 84 (+40%)
Mutual labels:  shodan
Expcamera
Exploit Netwave and GoAhead IP Camera
Stars: ✭ 194 (+223.33%)
Mutual labels:  shodan
Baf
Blind Attacking Framework
Stars: ✭ 71 (+18.33%)
Mutual labels:  shodan
Grinder
🔎 Python framework to automatically discover and enumerate hosts from different back-end systems (Shodan, Censys)
Stars: ✭ 209 (+248.33%)
Mutual labels:  shodan
Awesome Shodan Queries
🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩‍💻
Stars: ✭ 2,758 (+4496.67%)
Mutual labels:  shodan
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (+110%)
Mutual labels:  shodan
Xray
XRay is a tool for recon, mapping and OSINT gathering from public networks.
Stars: ✭ 1,666 (+2676.67%)
Mutual labels:  shodan

Knock

Scan random IP addresses on the Internet for open SSH and Telnet ports. Then automatically hack them by using THC-Hydra. The entire process is automated by Knock, and credentials are printed to console as they are found.

When tested on a 25/5 Mbps connection, Knock found an average of 3 server login credentials per hour.

Disclaimer

⚠️ Using this program in it's current state is illegal in most countries. I am not responsible for your actions.

Demo

A demo of running this software. It can take several hours on a good connection before Knock starts finding accounts. It's best to run this on a server in the background.

Demo Image

Installation

  • Install the following:
    • redis, nmap, hydra, and node
  • Start the Redis service, edit the .env file to point to it
  • Then run:
    git clone https://github.com/petercunha/knock.git
    cd knock
    npm i
    npm start

Roadmap

  • Network Worm
    • Cross-platform, portable binary version of this software.
    • After hacking into vulnerable service, drop the binary and start it.
    • Cracking speed grows linearly with each machine hacked.
    • Potentially centralized C&C through Tor (?)
  • Web UI for monitoring cracking jobs and progress
  • Shodan API integration
  • Support for VNC, RDP, FTP, and others.

Pull Requests Welcome!

Pull requests are welcome and encouraged! Feel free to fork, hack, and contribute to the project.

Notice

⚠️ This software is under active development, features are subject to change in future versions.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].