gazillion_the_brute
v1.0.1
Published
Overview Gazilion the Brute is a Python tool designed for brute forcing endpoints using a wordlist. It provides a simple yet effective way to perform brute-force attacks on specified target.
Downloads
1
Readme
Gazilion the Brute
Overview
Gazilion the Brute is a Python tool designed for brute forcing endpoints using a wordlist. It provides a simple yet effective way to perform brute-force attacks on specified target.
Features
- Customizable wordlists for testing.
- Support for different request methods (get, post).
- Option to specify the target URL and protocol.
- Hide response status code for cleaner output.
- Help option for quick reference to available commands.
Getting Started
Prerequisites
- Python3
- pip3
Screen Shots 📸 :
Installation
Clone the repository:
git clone https://github.com/thejas-dev/Gazillion-the-brute cd Gazillion-the-brute
Install dependencies (if any):
pip install -r requirements.txt
Making the Tool Global
To make Gazilion the Brute globally accessible from any directory, follow these steps:
Open your Zsh configuration file (
~/.zshrc
) in a text editor:nano ~/.zshrc
Replace
nano
with your preferred text editor.Add the following line at the end of the file, replacing
/path/to/tool/directory
with the actual path to the tool directory:export PATH=$PATH:/path/to/tool/directory
Save the file and exit the text editor.
Reload your Zsh configuration to apply the changes:
source ~/.zshrc
Now, you can run Gazilion the Brute from any directory using:
python3 brute.py
Usage
Options
- -m : Method of the request ['get', 'post']
- -t : Target URL
- -p : Protocol options are ['http', 'https']
- -hR: Hide response status code
- -w : Path to the wordlist file (default: default_wordlist.txt)
- -h: Help
Example
Run the tool with the following command:
python3 brute.py -t 'https://your-target.com' -m post -p https -hR 500,404 -w custom_wordlist.txt
Connect with me on