Metadata-Version: 2.1
Name: patator
Version: 1.1
Summary: multi-purpose brute-forcer
Home-page: https://github.com/lanjelot/patator
Author: Sebastien Macke
License: GPLv2
Keywords: pentest brute force password attack
Classifier: Development Status :: 4 - Beta
Classifier: Environment :: Console
Classifier: Intended Audience :: Developers
Classifier: Intended Audience :: System Administrators
Classifier: Intended Audience :: Information Technology
Classifier: License :: OSI Approved :: GNU General Public License v2 (GPLv2)
Classifier: Programming Language :: Python :: 3
Classifier: Operating System :: Microsoft :: Windows
Classifier: Operating System :: POSIX :: Linux
Classifier: Topic :: Utilities
Classifier: Topic :: Security
Requires-Python: >=2.7, !=3.0.*, !=3.1.*, !=3.2.*, <4
License-File: LICENSE
Requires-Dist: paramiko==3.5.1
Requires-Dist: pycurl==7.45.4
Requires-Dist: ajpy==0.0.5
Requires-Dist: impacket==0.12.0
Requires-Dist: cx_Oracle==8.3.0
Requires-Dist: mysqlclient==2.2.7
Requires-Dist: psycopg2-binary==2.9.10
Requires-Dist: pycryptodomex==3.21.0
Requires-Dist: dnspython==2.7.0
Requires-Dist: IPy==1.1
Requires-Dist: pysnmp==7.1.16
Requires-Dist: telnetlib-313-and-up==3.13.1

Patator was written out of frustration from using Hydra, Medusa, Ncrack, Metasploit modules and Nmap NSE scripts for password guessing attacks. I opted for a different approach in order to not create yet another brute-forcing tool and avoid repeating the same shortcomings. Patator is a multi-threaded tool written in Python, that strives to be more reliable and flexible than his fellow predecessors.
