• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

piggy – Download MS-SQL Password Brute Forcing Tool

July 23, 2007

Views: 22,171

[ad]

Piggy is yet another tool for performing online password guessing against Microsoft SQL servers.

It supports scanning multiple servers using a dictionary file or a file with predefined accounts (username and password combinations).

It’s a pretty simple tool and has a Win32 binary verson – it is a command line tool however.

1
2
3
4
5
6
7
8
9
10
11
12
13
Piggy v1.0.1 by patrik@cqure.net
--------------------------------
usage: piggy [options]
 
options:
   -u [username] - Single username
   -p [password] - Single password
   -s [server]   - Single server
   -S [srvfile]  - File containing ip/hostnames
   -D [dicfile]  - File containing passwords
   -A [accounts] - File containing username;password combinations
   -N            - Do not check availability before scan
   -v verbose    - Verbose logging

You can download it here:

piggy-src-1_0_1.zip (Source code)
piggy-win32-1_0_1.zip (Binary version)

Share
Tweet
Share
Buffer
WhatsApp
Email
0 Shares

Filed Under: Database Hacking, Hacking Tools, Password Cracking Tools Tagged With: brute-force, brute-forcing, hacking-databases, hacking-ms-sql, ms-sql, Password Cracking, password-hacking



Reader Interactions

Comments

  1. backbone says

    July 23, 2007 at 8:36 pm

    even if a simple one this is a great tool, this way we could dump the database in a simpler way without the need to get complicated with sql injection to dump it.

  2. Sandeep Nain says

    July 23, 2007 at 11:41 pm

    its just like a blade.. small & sharp :)

    very impressive…

  3. backbone says

    July 24, 2007 at 12:25 am

    and like a blade it is very messy.

    if you don’t get it right from the first time (with the dictionary and all that stuff), than you’d better give up due to the fill up of your IP in the log file :(

  4. TheRealDonQuixote says

    July 24, 2007 at 5:37 am

    I know I can’t code for crap, or spell or type for that matter.
    Hey backbone, can you fix to the source code so Piggy is easier to use? Or at least fix the Log File issue? Just wondering, cause that would be awesome!!

  5. backbone says

    July 24, 2007 at 11:02 am

    theRealDonQuixote: I’m not the person who developed this, so why not try and ask the developers of Piggy =)

  6. TheRealDonQuixote says

    July 24, 2007 at 9:39 pm

    backbone- I doubt the d00d over at cquer.com has more time to fiddle with this little tool. That’s why we publish the source code, so peeps can help out and make tools better and better. A million heads are better than one, or so they say. :)

  7. Sandeep Nain says

    July 26, 2007 at 6:22 am

    I agree with you TRDQ but someone has to take the lead and why don’t you start it instead of askin backbone :)

    and if you don’t know coding.. this can be your starting point… what say?? ;)

  8. TheRealDonQuixote says

    July 26, 2007 at 8:30 am

    Sandeep – Oooooh No. I’m not taking on another side project right now. Heck I can barely keep up with my crap blog!! ;)

  9. backbone says

    July 26, 2007 at 6:36 pm

    TRDQ, we all can give excuses, as I have done earlier on this post….

    why? because I am no C/C++ coder, and I am also working on a project already, you’ll surely like it when it will be over ;)

  10. TheRealDonQuixote says

    July 27, 2007 at 12:10 am

    BKBN – My interest is peaked. Now, you have to tell us what your project is. ;)
    I already said mine was putting all the pentesting tools from BackTrack2 onto a Kubuntu distro. Now your turn…just a hint? Please?

  11. Sandeep Nain says

    July 27, 2007 at 12:14 am

    backbone is just giving an excuse TRDQ.
    when are you releasing your kubuntu based edition

  12. TheRealDonQuixote says

    July 27, 2007 at 12:36 am

    Sandeep – As soon as I can figure out how to get it done in an efficient manner. I know that I should be able to write a bash script for each slax module in order to use recontructor to add the modules to a Kubuntu iso, but I don’t know where to get the modules for all the bactrack tools AND I don’t want to write 300+ bash scripts. There has to be an easier way. I just haven’t found it yet.

  13. backbone says

    July 27, 2007 at 3:12 pm

    I don’t just make up excuses…

    http://sla.ckers.org/forum/read.php?16,13327

  14. Sandeep Nain says

    July 27, 2007 at 3:53 pm

    backbone: nice… it seems very promising. (and i didnt intend to hurt you or your feelings in any way…)

  15. backbone says

    July 27, 2007 at 4:08 pm

    I’m not an emo to get so fast hurt… anyway I posted it because TRDQ also posted a comment about his work… hey TRDQ hope you contact me when you finish the project ;)

  16. Sandeep Nain says

    July 30, 2007 at 12:08 am

    BB:good that u dnt mind on such small things…

    TRDQ: Lemme know if you need any assistance to finish off your project… happy to help you to serve the community.

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Falco - Real-Time Threat Detection for Linux and Containers

Falco – Real-Time Threat Detection for Linux and Containers

Views: 328

Security visibility inside containers, Kubernetes, and cloud workloads remains among the hardest … ...More about Falco – Real-Time Threat Detection for Linux and Containers

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Views: 623

As threat surfaces grow and attack sophistication increases, many security teams face the same … ...More about Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 571

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 607

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 462

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 690

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,298,115)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,105)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,640)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,691)
  • Password List Download Best Word List – Most Common Passwords (933,528)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,171)
  • Hack Tools/Exploits (673,301)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,185)

Search

Recent Posts

  • Falco – Real-Time Threat Detection for Linux and Containers May 19, 2025
  • Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance May 16, 2025
  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy