buraq

command module
v1.0.1 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Apr 30, 2022 License: GPL-3.0 Imports: 8 Imported by: 0

README

Banner

Linux     GitHub go.mod Go version of a Go module     GPLv3 license    

buraq

A command-line based utility for bruteforcing ssh

Contents

Installation 💾

To install buraq, clone the repository at the desired location:

$ git clone https://github.com/NovusEdge/buraq.git

Setup & Uninstallation 💡

After cloning the repository to your machine, navigate to it and run the setup script.

$ cd buraq

$ # Run the setup script:
$ bash setup.bash

NOTE: buraq is not added to $PATH by the setup script. If you wish to add it to your PATH, add the following line to your ~/.profile or ~/.bashrc files after running the setup script.

PATH=$PATH:$(cat $HOME/.buraq/env | grep BURAQBIN | awk -F'=' '{print $2}') >> ~/.profile

Alternatively, if you don't want to add it to PATH, you can simply type in:

$ export PATH=$PATH:$(cat $HOME/.buraq/env | grep BURAQBIN | awk -F'=' '{print $2}')

Usage 🚀

To display help/usage information for buraq, use buraq help:

$ buraq help
buraq v1.0.0 (c) 2022 by Aliasgar Khimani (NovusEdge) - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).

Buraq:
    A command-line utility for bruteforcing ssh

USAGE:
    buraq [command] [options] target

COMMANDS:
    help                Prints this menu if no further option is provided. This
                        can be used in conjunction with other command names to
                        print a more comprehensive guide for usage of said command.
                        For example:
                            buraq help check
                        This will print out information about the check command.

    version             Prints the version of buraq in use.
    env                 Prints the environment variables used by the CLI.
                        These are stored (by default) in ~/.buraq

    attack              Perform a bruteforce attack on specified target using
                        a user/userlist and a password list.
                        If no user is specified, "root" is used.
                        If no password list is used, "~/.buraq/passlist.txt" is used.

    clean               Clear all binaries for the CLI.
    repair              Clear and rebuild all binaries for the CLI.

❗ Warning ❗

This tool is meant for legal purposes only. Please use at your own discretion, the owner of the project does not hold any accountability for what this tool is used for.

License 📜

This project uses the GNU General Public License v3.0, please check the LICENSE file for more information.

Credits ❇

The default password list used by buraq can be found on the Seclists and is called: xato-net-10-million-passwords-100000.txt

Also, I borrowed the line:

buraq v1.0.0 (c) 2022 by Aliasgar Khimani (NovusEdge) - Please do not use in military or secret service organizations, or for illegal purposes (this is non-binding, these *** ignore laws and ethics anyway).

from the hydra project I hope they don't mind. >.>

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL