Brutality - A Fuzzer For Whatever Conk Entries
Influenza A virus subtype H5N1 fuzzer for whatever GET entries.
Features
- Multi-threading on demand
- Fuzzing, bruteforcing GET params
- Find admin panels
- Colored output
- Hide results past times supply code, give-and-take numbers
- Proxy support
- Big wordlist
- Colored
Usages
- Install
git clone https://github.com/ManhNho/brutality.git chmod 755 -R brutality/ cd brutality/ pip install -r requirements.txt
- Helps
python brutality -h
Examples
- Use default wordlist alongside v threads (-t 5) in addition to cover 404 messages (–e 404) to fuzz the given URL (http://192.168.1.1/FUZZ):
python brutality.py -u 'http://192.168.1.1/FUZZ' -t v -e 404
- Use common_pass.txt wordlist (-f ./wordlist/common_pass.txt), take away reply alongside 6969 length (-r 6969) in addition to proxy at 127.0.0.1:8080 (-p http://127.0.0.1:8080) to fuzz the given URL (http://192.168.1.1/brute.php?username=admin&password=FUZZ&submit=submit#):
python brutality.py -u 'http://192.168.1.1/brute.php?username=admin&password=FUZZ&submit=submit#' -f ./wordlist/common_pass.txt -r 6969 -p http://127.0.0.1:8080
Images