A versatile web app brute-force tool written in pure Python, capable of running attacks in multiple threads (user-definable) and attempting combinations randomly rather than sequentially.
To use this tool, you have to save requests to a file from burp-suit, why'd do that? you might ask. Well, because this tool has randomized brute-forcing and there's no throattling unlike burp-suit, specially the community version. in the request file, replace the part where the payload is being sent with {{num}}
NOTE: This tool uses jinja templates underneath
example:
From:
POST /api/users HTTP/1.1
Host: www.example.com
Content-Type: application/json
{ "userid": "7793", "email": "[email protected]", "password": "securepassword123" }
To:
POST /api/users HTTP/1.1
Host: www.example.com
Content-Type: application/json
{ "userid": "{{num}}", "email": "[email protected]", "password": "securepassword123" }
You can add the payload/num anywhere in the request file.
-f <request filepath>
use this flag to specify the path of the request file-e <error message>
the error message shown on incorrect attempt-s <stop message>
(optional) specify the expected message where you want the attack stop-c <status code of error response>
the status code came with the error message in response-t <number of threads>
(optional) use this to add the number of threads you wanna run duruing the attack, default is 3-l <lenght of the number>
add the lenght of combinations to try-H
(optional) add this flag to disable HTTPS when the server doesn't support HTTPs
example:
python main.py -f post_req.http -e "invalid attempt" -s success -c 401 -t 5 -l 4
numberute will keep sending payloads as long as:
- it finds either the
error message
given or theerror status code
in the response. - or the response doesn't contain the expected message
numbrute stops the attack when the response doesn't match the above condition