Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/oppsec/tomcter

😹 Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with default credentials.
https://github.com/oppsec/tomcter

apache apache-tomcat bruteforce docker hacktoberfest login pentest pentest-tool python python3 tomcat tool

Last synced: 4 days ago
JSON representation

😹 Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with default credentials.

Awesome Lists containing this project

README

        

# 😹 Tomcter
> Stealing credentials from a yellow cat










___


😹 Tomcter is a python tool developed to bruteforce Apache Tomcat manager login with default credentials.


## ⚡ Installing / Getting started

A quick guide of how to install and use Tomcter.
1. Clone the repository with `git clone https://github.com/oppsec/tomcter.git`
2. Install required libraries with `pip install -r requirements.txt`

### Single Target
`python3 main.py -u http://host`

### Multiple Targets
`python3 main.py -l file.txt`


### 🐳 Docker
If you want to use Tomcter in a Docker container, follow this commands:

1. Clone the repository with `git clone https://github.com/oppsec/tomcter.git`
2. Build the image with `sudo docker build -t tomcter:latest .`
3. Run the container with `sudo docker run tomcter:latest`



### ⚙️ Pre-requisites
- [Python 3](https://www.python.org/downloads/) installed on your machine.
- Install the libraries with `pip3 install -r requirements.txt`



### ✨ Features
- Works with ProxyChains
- Fast Brute-Force
- Low RAM and CPU usage
- Open-Source
- Python ❤️



### 🔨 Contributing

A quick guide of how to contribute with the project.

1. Create a fork from Tomcter repository
2. Clone the repository with `git clone https://github.com/your/tomcter.git`
3. Type `cd tomcter/`
4. Create a branch and make your changes
5. Commit and make a git push
6. Open a pull request



### ⚠️ Warning
- The developer is not responsible for any malicious use of this tool.