Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/tonybaloney/hathi
A dictionary attack tool for PostgreSQL and MSSQL
https://github.com/tonybaloney/hathi
penetration-testing pentesting
Last synced: about 2 months ago
JSON representation
A dictionary attack tool for PostgreSQL and MSSQL
- Host: GitHub
- URL: https://github.com/tonybaloney/hathi
- Owner: tonybaloney
- License: mit
- Created: 2021-06-10T22:17:10.000Z (over 3 years ago)
- Default Branch: master
- Last Pushed: 2022-04-12T06:12:17.000Z (over 2 years ago)
- Last Synced: 2024-10-06T19:25:37.608Z (2 months ago)
- Topics: penetration-testing, pentesting
- Language: Python
- Homepage:
- Size: 348 KB
- Stars: 36
- Watchers: 3
- Forks: 5
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Hathi
[![PyPI version](https://badge.fury.io/py/hathi.svg)](https://badge.fury.io/py/hathi)
A SQL host scanner and dictionary attack tool. Comes with a script (`filter_pass.py`) to filter a series of password lists based on password strength.
![Screenshot of hathi in action](hathi-mysql-demo.png)
## Installation
Install using PyPI to install the Postgres driver
```console
pip install hathi
```For the optional MSSQL support, install
```console
pip install "hathi[mssql]"
```For the optional MySQL support, install
```console
pip install "hathi[mysql]"
```## Usage
```default
usage: hathi [-h] [--username USERNAME [USERNAME ...]] [--range RANGE [RANGE ...]] [--usernames FILE] [--passwords FILE] [--hostname HOSTNAME]
[--json] [--mssql] [--postgres] [--mysql] [--multiple]
[host ...]Port scan and dictionary attack PostgreSQL, MSSQL and MySQL servers.
positional arguments:
host host to scanoptional arguments:
-h, --help show this help message and exit
--username USERNAME [USERNAME ...]
specific username
--range RANGE [RANGE ...]
CIDR range, e.g. 192.168.1.0/24
--usernames FILE Path to plaintext username list file
--passwords FILE Path to plaintext password list file
--hostname HOSTNAME an @hostname to append to the usernames
--json Output in JSON
--mssql Force scanning hosts as MSSQL
--postgres Force scanning hosts as Postgres
--mysql Force scanning hosts as Mysql
--multiple Seek multiple username/password pairs on a single host
--database DATABASE try a specific database name
--no-ssl Disable TLS/SSL connections
```Use a wordlist generator like [this one](https://github.com/zzztor/intelligence-wordlist-generator) or [this one](https://github.com/sc0tfree/mentalist) to create more effective password lists.