How to Install and Uninstall brutespray Package on Ubuntu 20.10 (Groovy Gorilla)
Last updated: December 23,2024
1. Install "brutespray" package
This is a short guide on how to install brutespray on Ubuntu 20.10 (Groovy Gorilla)
$
sudo apt update
Copied
$
sudo apt install
brutespray
Copied
2. Uninstall "brutespray" package
Please follow the guidelines below to uninstall brutespray on Ubuntu 20.10 (Groovy Gorilla):
$
sudo apt remove
brutespray
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the brutespray package on Ubuntu 20.10 (Groovy Gorilla)
Package: brutespray
Architecture: all
Version: 1.6.8-1
Priority: optional
Section: universe/net
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Security Tools
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 113
Depends: medusa, python3-argcomplete, python3:any
Recommends: nmap
Filename: pool/universe/b/brutespray/brutespray_1.6.8-1_all.deb
Size: 11840
MD5sum: 2b82bbbea3cd572f503d681d4d8ff903
SHA1: 1eb74dc09787308fb514b3d866ff4444858aaa50
SHA256: c76cb730a45353d3c254bd4e2bd688aaa21e68e7294cfef7dcd29d8f5860332b
SHA512: 5268bdd84fb70fcce7bc71867cdff2b054b3d44a34474e8953f6bbafbf1d9ee3982d8d8f09d7254f87d000b1f6f3ffc8e9a0843234934f4e84544aa299eff4ff
Homepage: https://github.com/x90skysn3k/brutespray
Description-en: Python bruteforce tool
This Python script takes nmap GNMAP/XML output and automatically brute-forces
services with default credentials using Medusa.
BruteSpray can even find non-standard ports by using the -sV inside Nmap.
Description-md5: f7548325f9a8edfd8bb01520d09b299e
Architecture: all
Version: 1.6.8-1
Priority: optional
Section: universe/net
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Security Tools
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 113
Depends: medusa, python3-argcomplete, python3:any
Recommends: nmap
Filename: pool/universe/b/brutespray/brutespray_1.6.8-1_all.deb
Size: 11840
MD5sum: 2b82bbbea3cd572f503d681d4d8ff903
SHA1: 1eb74dc09787308fb514b3d866ff4444858aaa50
SHA256: c76cb730a45353d3c254bd4e2bd688aaa21e68e7294cfef7dcd29d8f5860332b
SHA512: 5268bdd84fb70fcce7bc71867cdff2b054b3d44a34474e8953f6bbafbf1d9ee3982d8d8f09d7254f87d000b1f6f3ffc8e9a0843234934f4e84544aa299eff4ff
Homepage: https://github.com/x90skysn3k/brutespray
Description-en: Python bruteforce tool
This Python script takes nmap GNMAP/XML output and automatically brute-forces
services with default credentials using Medusa.
BruteSpray can even find non-standard ports by using the -sV inside Nmap.
Description-md5: f7548325f9a8edfd8bb01520d09b299e