воскресенье, 7 июня 2020 г.

Brutality: A Fuzzer For Any GET Entries

Brutalitys' Features
  • Multi-threading on demand.
  • Fuzzing, bruteforcing GET params.
  • Find admin panels.
  • Colored output.
  • Hide results by return code, word numbers.
  • Proxy support.
  • Big wordlist.
Screenshots:

Brutality's Installtion

How to use Brutality?

Examples:
   Use default wordlist with 5 threads (-t 5) and hide 404 messages (–e 404) to fuzz the given URL (http://192.168.1.1/FUZZ):
python brutality.py -u 'http://192.168.1.1/FUZZ' -t 5 -e 404

   Use common_pass.txt wordlist (-f ./wordlist/common_pass.txt), remove response with 6969 length (-r 6969) and proxy at 127.0.0.1:8080 (-p http://127.0.0.1:8080) to fuzz the given URL (http://192.168.1.1/brute.php?username=admin&password=FUZZ&submit=submit#):
python brutality.py -u 'http://192.168.1.1/brute.php?username=admin&password=FUZZ&submit=submit#' -f ./wordlist/common_pass.txt -r 6969 -p http://127.0.0.1:8080

ToDo List:
  • Smooth output.
  • Export file report.
  • Modularization.

Continue reading
  1. Pentest Services
  2. Pentesterlab
  3. Pentest+ Vs Ceh
  4. Pentest Certification
  5. Pentest Checklist
  6. Hacker Ethic
  7. Hacking Tools
  8. Hacking Vpn
  9. Pentest Network
  10. Hacking Process
  11. Pentest Cyber Security
  12. Pentestmonkey Cheat Sheet
  13. Pentest Distro
  14. Pentest Cyber Security
  15. Pentest Lab Setup
  16. Pentest Security
  17. Hacker Anonymous
  18. Pentest Ubuntu
  19. Pentest Framework
  20. Pentest Security

Комментариев нет:

Отправить комментарий