Patator is a flexible and expandable vulnerability assessment and brute-force tool for evaluating the security of different services and systems. It is a useful tool for penetration testers and security experts as it supports a variety of protocols and attack kinds.

Patator is a versatile and extensible brute-force and vulnerability assessment tool designed for testing the security of various systems and services. It supports a wide range of protocols and attack types, making it a valuable asset for penetration testers and security professionals.


  • Patator supports multiple protocols, including SSH, FTP, HTTP, Telnet, and more. Its versatility allows users to test the security of various authentication mechanisms.
  • Patator utilizes attack modules for different protocols, and users can customize these modules to tailor attacks to specific requirements. This includes adjusting attack parameters, payload lists, and more.
  • Patator is designed for efficiency, supporting parallel and distributed attacks. This enables faster and more effective brute-force attempts against multiple targets simultaneously.
  • Patator supports various attack types, including brute-force attacks, dictionary attacks, and hybrid attacks. Users can choose the most suitable attack type based on the characteristics of the target system.
  • The tool provides flexibility in specifying payloads for attacks. Users can define custom wordlists, utilize predefined lists, or even generate payloads dynamically, enhancing the adaptability of Patator.
  • Patator integrates seamlessly with other penetration testing tools and frameworks. This integration allows users to incorporate Patator into broader security assessments and workflows.


Use the following command to install Patator from the official Kali Linux repositories:



Initiate a basic Patator command by specifying the target service, attack module, and other relevant parameters. For example:


Replace <target_host> with the target's IP address or hostname, users.txt with the file containing usernames, and passwords.txt with the file containing passwords.


Table of Contents: