Dumb – Domain Bruteforce , A tool to bruteforce domains

How DUMB works Dumb works with a masked dumain for substitution. The dumain can have as many masks as you want as long as you pass the according wordlists, explain information security training experts.  Bruteforcing subdumains: Using the mask DUMB.dumain.com and the following wordlists: www ftp backoffice Dumb will generate the following dumains for bruteforce: http://www.dumain.com. ftp.dumain.com. […]

CrawlBox – Easy Way to Brute-force Web Directory

Easy way to brute-force web directory. Operating Systems Tested: MacOSX Kali Linux Usage: python crawlbox.py [-h] [-v] [-w WORDLIST] url positional arguments: url specific target url, like domain.com optional arguments: -h, –help show this help message and exit -v, –version show program’s version number and exit -w WORDLIST specific path to wordlist file -d DELAY […]

RedLogin – SSH Brute-force Tools

Red Login: SSH Brute-force Tools. Features: High speed and precision CLI ( Console based ) Run the arbitrary command after the attack is successful ( Default ‘Uname -a’ ) Telegram messanger support for sending reports via bot API Usage: Redlogin.exe (Optional) -telegram ==> List of targets ip list ==> List of usernames want to test ==> List of […]

InstaBrute – Instagram Bruteforce Exploit Module

Instabrute exploit module bruteforces usernames and password for any given account. Features Check username existence Check password for a given username Dependencies Mechanize CookieLib Simplejson OptParse Selenium Usage: usage: git clone https://github.com/chinoogawa/instaBrute cd instaBrute pip install selenium pip install Mechanize pip install Simplejson pip install OptParse pip install Mechanize python instabrute.py -h ( for Helper) […]

Blazy – Modern Login Bruteforcer Which Also Tests For CSRF, Clickjacking, Cloudflare and WAF

Blazy is a modern login page bruteforcer. Features Easy target selections Smart form and error detection CSRF and Clickjacking Scanner Cloudflare and WAF Detector 90% accurate results Checks for login bypass via SQL injection Multi-threading 100% accurate results Better form detection and compatibility Requirements Beautiful Soup Mechanize Usages Open your terminal and enter git clone […]

Online Password Bruteforce Attack With THC-Hydra Tool

According to Kali, THC-Hydra Tool is a parallelized login cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This Tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely. It […]

WIBR (WiFi BruteForce) – Android App For Hackers

WIBR is an android app that you can use to break into a password protected (weak) WiFi network. It is actually a brute forcer that allows you to perform a dictionary attack on the target. If you don’t know what is a dictionary attack, read this Wikipedia article: Dictionary_Attack Note: Turn on your WiFi before […]

New Linux SSH Brute-force LUA Bot Shishiga Detected in the Wild

A new Linux malware has been spotted in the wild by security researchers at Eset, and it is much more sophisticated than any of the previously known Linux based malware. The security researchers have named this malware as “Linux/Shishiga” which utilizes four different protocols according to Eset research team. The protocols used are Telnet, HTTP and […]

brut3k1t – Server Side Bruteforce Module

Brute-force (dictionary attack, jk) attack that supports multiple protocols and services http://ex0dus-0x.github.io Introduction brut3k1t is a server-side bruteforce module that supports dictionary attacks for several protocols. The current protocols that are complete and in support are: ssh ftp smtp XMPP instagram facebook There will be future implementations of different protocols and services (including Twitter, Facebook, […]

Use BruteXSS BruteForcer For Cross Site Scripting

BruteXSS is a very speedy go-site Scripting Brute forcing tool which can brute force parameters. It lets in you to inject several payloads from a wordlist to that particular parameters and then check the selected web page for XSS vulnerabilities. in line with the builders, “BruteXSS is noticeably correct at doing its mission and there’s […]

WiFi Bruteforcer – Android App to crack WiFi Passwords

WiFi Bruteforcer is an android application that bruteforces WiFi passwords using an android device. It does not require a rooted device and is very fast and reliable. The tool has been developed by Fsecurify. Usage: Turn on your wifi. Open the application and scan networks. Select any WEP/WPA2 network and a new screen will open. […]

How to Use Doona Bruteforce Exploit Detector Tool in Kali Linux

Doona is a forked version of the Bruteforce Exploit Detection tool or simply BED. The Bruteforce Exploit Detection tool is designed to check for the daemons for potential buffer overflows, format the string bugs etc. In Australian , Doona means duvet. Doona adds a lot of new features and changes to the BED. If you […]

F-Scrack – Bruteforce Tool With Mutli-Protocol Support

FTP MySQL MSSQ MongoDB Redis Telnet Elasticsearch PostgreSQL. Compatible Operating system: OSX Linux Windows Python 2.6+ How to run the command: python F-Scrack.py -h 192.168.1 [-p 21,80,3306] [-m 50] [-t 10] -h Supports ip(192.168.1.1), ip range (192.168.1) (192.168.1.1-192.168.1.254), ip list (ip.ini) , maximum 65535 ips per scan. -p Ports you want to scan, use comma […]

How To Protect Your PC From A Brute-Force Attack

If someone is determined enough to guess your password using brute force then you need to lock down Windows . Here’s how to lock down Windows following several failed login attempts. Complex passwords can be a pain to remember and prone to mistyping, but shorter passwords can be much easier to guess by brute force. What […]

WordPress XML-RPC Service Used to Amplify Brute-Force Attacks

Hackers are hiding hundreds or thousands of username/password combinations in one single XML-RPC request. WordPress sites are being abused once again and there is no surprise since the platform is the most popular CMS on the Internet, and the attack surface is literally enormous when compared to other website-building solutions. This time around, Sucuri’s security researchers […]