Golang manager for bruteforce/password spray protocols attack
go build
$ ./Tupã -h
Usage of ./Tupã:
-b int
Input buffer size,i.e., file/memory chunks, ideally power of two. (default 4096)
-f string
Input file name, if none input=Stdin.
-hp string
HostPort String as host:port. (default "127.0.0.1:8080")
-n int
Thread number, prefer n as power of two. (default 16)
-p string
Protocol/Service to brute (default "ftp")
-t Skip TLS TrustChain verification (default true)
-to int
TCP timeout (default 3)
-u string
User/account for the attack. (default "admin")
-xt
Make all tail strings as extra value to protocol parser
$ ./Tupã -hp 10.2.240.1:21 -n 10 -f passwordlist.txt -p ftp
... ... ...
$ cat wordlist.txt | ./Tupã -hp 10.2.240.1:21 -n 10 -u Administrator -p ftps