Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/codexlynx/brutemq
:skull: An exotic service bruteforce tool.
https://github.com/codexlynx/brutemq
amqp brute-force etcd hacking message-broker rabbitmq red-team vault
Last synced: 5 days ago
JSON representation
:skull: An exotic service bruteforce tool.
- Host: GitHub
- URL: https://github.com/codexlynx/brutemq
- Owner: codexlynx
- License: gpl-3.0
- Created: 2018-10-14T16:51:57.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2022-07-06T19:03:13.000Z (over 2 years ago)
- Last Synced: 2024-06-20T16:44:58.661Z (5 months ago)
- Topics: amqp, brute-force, etcd, hacking, message-broker, rabbitmq, red-team, vault
- Language: Go
- Homepage:
- Size: 45.9 KB
- Stars: 13
- Watchers: 2
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
## BruteMQ / An exotic service bruteforce tool
[![](https://github.com/codexlynx/brutemq/workflows/CI/badge.svg)](https://github.com/codexlynx/brutemq/actions) [![AUR](https://img.shields.io/github/license/codexlynx/brutemq)](LICENSE) [![](https://goreportcard.com/badge/github.com/codexlynx/brutemq)](https://goreportcard.com/report/github.com/codexlynx/brutemq)Services supported:
* HashiCorp Vault Userpass
* etcd v3
* AMQP PLAIN SASL### History:
Brutemq was a tool initially designed to brute force rabbitmq (amqp) queue messaging services.
After implementing the first working version, new needs arose and etcd and HashiCorp Vault Userpass services were added.### Run:
You can compile the binary or run via OCI image.
#### Compile:
* Requirements:
* A version of __Docker__ with __BuildKit__ support.
* GNU __make__ utility.* Procedure:
* Run: `make`.
* Check the correct creation of `dist` directory.#### OCI Image:
> $ docker run --net=host ghcr.io/codexlynx/brutemq:latest
Add to your shell profile:
```
function brutemq {
docker run --net=host ghcr.io/codexlynx/brutemq:latest $@
}
```
Or
```
alias brutemq='docker run --net=host ghcr.io/codexlynx/brutemq:latest'
```For more details click [here](https://github.com/codexlynx/brutemq/pkgs/container/brutemq).
### Webhook:
Set `WEBHOOK_URL` environment variable to send an http webhook request when the password is discovered.### Kubernetes:
You can launch brutemq on a Kubernetes cluster for various reasons, either because you can't set up port-forwarding and
want to attack an endpoint on one of the cluster's internal networks (lack of permissions in RBAC or other limitations)
or simply because you want to manage the workload on your own cluster. Check the `deployments` directory and set the
[manifest](deployments/kubernetes_job.yaml) to your needs.### Usage:
```
brutemq - An exotic service bruteforce toolUsage:
brutemq [command]Available Commands:
amqp Bruteforce AMQP PLAIN SASL service endpoint
completion Generate the autocompletion script for the specified shell
etcd Bruteforce etcdv3 service endpoint
help Help about any command
vault Bruteforce HashiCorp Vault Userpass authFlags:
-d, --dictionary string dictionary file path
-h, --help help for brutemq
-t, --threads int threads number (default 100)Use "brutemq [command] --help" for more information about a command.
```#### Example:
> $ brutemq amqp -d passwords.txt -u admin -e localhost:5672/ -t 500