Nmap Development mailing list archives
GSoC 2026: Password Security Wizard - Optimizing the NSE Brute Library
From: Adithya Shetty <adithyashetty39 () gmail com>
Date: Mon, 2 Mar 2026 20:38:43 +0530
Hi Nmap Development Team and Fotis, My name is Adithya, and I am a 4th-semester Computer Science student specializing in Cybersecurity. I am writing to express my strong interest in the "Password Security Wizard" project for GSoC 2026. Over the past few days, I have cloned the repository, set up my build environment, and have been digging into the nselib/brute.lua library and several of the -brute.nse scripts (specifically focusing on how ftp-brute.nse implements the Driver and Engine:new functions). Coming from a background of playing CTFs and writing Python/C++ tooling, I am very interested in the project's goal of improving the brute force authentication cracking ability of NSE. Before drafting my formal proposal, I wanted to ask a structural question regarding the performance optimization of the underlying NSE parallelization system: When looking to bring the NSE brute library's performance closer to a dedicated tool like Ncrack, are you currently prioritizing optimizations within the Lua engine's coroutine scheduling, or are you looking more toward optimizing the underlying C/C++ socket handling (Nsock) that the Lua scripts rely on? I am currently testing a few of the brute scripts against local vulnerable VMs to benchmark their current throughput. Any guidance on where the major bottlenecks currently reside would be highly appreciated. Thank you for your time and for maintaining such an incredible project. Best regards, Adithya B Shetty Github: adithyashetty39-lang
_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at https://seclists.org/nmap-dev/
Current thread:
- GSoC 2026: Password Security Wizard - Optimizing the NSE Brute Library Adithya Shetty (Mar 02)
