- Multi-threading on demand.
- Fuzzing, bruteforcing GET params.
- Find admin panels.
- Colored output.
- Hide results by return code, word numbers.
- Proxy support.
- Big wordlist.
Brutality's Installtion
How to use Brutality?
Examples:
Use default wordlist with 5 threads (-t 5) and hide 404 messages (–e 404) to fuzz the given URL (http://192.168.1.1/FUZZ):
python brutality.py -u 'http://192.168.1.1/FUZZ' -t 5 -e 404
Use common_pass.txt wordlist (-f ./wordlist/common_pass.txt), remove response with 6969 length (-r 6969) and proxy at 127.0.0.1:8080 (-p http://127.0.0.1:8080) to fuzz the given URL (http://192.168.1.1/brute.php?username=admin&password=FUZZ&submit=submit#):
python brutality.py -u 'http://192.168.1.1/brute.php?username=admin&password=FUZZ&submit=submit#' -f ./wordlist/common_pass.txt -r 6969 -p http://127.0.0.1:8080
ToDo List:
- Smooth output.
- Export file report.
- Modularization.
Continue reading
- Pentest Services
- Pentesterlab
- Pentest+ Vs Ceh
- Pentest Certification
- Pentest Checklist
- Hacker Ethic
- Hacking Tools
- Hacking Vpn
- Pentest Network
- Hacking Process
- Pentest Cyber Security
- Pentestmonkey Cheat Sheet
- Pentest Distro
- Pentest Cyber Security
- Pentest Lab Setup
- Pentest Security
- Hacker Anonymous
- Pentest Ubuntu
- Pentest Framework
- Pentest Security
Комментариев нет:
Отправить комментарий