Tuesday, June 9, 2020

Brutality: A Fuzzer For Any GET Entries

Brutalitys' Features
  • Multi-threading on demand.
  • Fuzzing, bruteforcing GET params.
  • Find admin panels.
  • Colored output.
  • Hide results by return code, word numbers.
  • Proxy support.
  • Big wordlist.
Screenshots:

Brutality's Installtion

How to use Brutality?

Examples:
   Use default wordlist with 5 threads (-t 5) and hide 404 messages (–e 404) to fuzz the given URL (http://192.168.1.1/FUZZ):
python brutality.py -u 'http://192.168.1.1/FUZZ' -t 5 -e 404

   Use common_pass.txt wordlist (-f ./wordlist/common_pass.txt), remove response with 6969 length (-r 6969) and proxy at 127.0.0.1:8080 (-p http://127.0.0.1:8080) to fuzz the given URL (http://192.168.1.1/brute.php?username=admin&password=FUZZ&submit=submit#):
python brutality.py -u 'http://192.168.1.1/brute.php?username=admin&password=FUZZ&submit=submit#' -f ./wordlist/common_pass.txt -r 6969 -p http://127.0.0.1:8080

ToDo List:
  • Smooth output.
  • Export file report.
  • Modularization.

More information


  1. Pentest+ Vs Ceh
  2. Hacking With Raspberry Pi
  3. Hacking Lab
  4. Pentest Web Application
  5. Hacking Simulator
  6. Pentest Ios
  7. Pentest Os
  8. Pentest Hardware
  9. Pentest Kit
  10. Pentest
  11. Pentest Stages
  12. Pentest Documentation
  13. Hacker Forum
  14. Hacker Typer
  15. Pentest As A Service
  16. Hacker Software
  17. Pentest Bootcamp
  18. Hacking For Dummies
  19. Pentest Iso

No comments:

Post a Comment