The main feature that makes cisco-torch different from similar tools is the extensive use of forking to launch multiple scanning processes on the background for maximum scanning efficiency. Also, it uses several methods of application layer fingerprinting simultaneously, if needed. We wanted something fast to discover remote Cisco hosts running Telnet, SSH, Web, NTP, TFTP  and SNMP services and launch dictionary attacks against the services discovered, including SNMP community attack (you would like the community.txt list 🙂 and TFTP servers (configuration filename bruteforcing with following config leeching). The tool can also get device configuration files automatically if SNMP RW community is found.


Download Link:-

This site is under maintenance,
some features might not work!!!