1.0.1 • Published 5 months ago

gazillion_the_brute v1.0.1

Weekly downloads
-
License
ISC
Repository
github
Last release
5 months ago

Gazilion the Brute

Overview

Gazilion the Brute is a Python tool designed for brute forcing endpoints using a wordlist. It provides a simple yet effective way to perform brute-force attacks on specified target.

Features

  • Customizable wordlists for testing.
  • Support for different request methods (get, post).
  • Option to specify the target URL and protocol.
  • Hide response status code for cleaner output.
  • Help option for quick reference to available commands.

Getting Started

Prerequisites

  • Python3
  • pip3

Screen Shots 📸 :

Installation

  1. Clone the repository:

    git clone https://github.com/thejas-dev/Gazillion-the-brute
    cd Gazillion-the-brute
  2. Install dependencies (if any):

    pip install -r requirements.txt

Making the Tool Global

To make Gazilion the Brute globally accessible from any directory, follow these steps:

  1. Open your Zsh configuration file (~/.zshrc) in a text editor:

    nano ~/.zshrc

    Replace nano with your preferred text editor.

  2. Add the following line at the end of the file, replacing /path/to/tool/directory with the actual path to the tool directory:

    export PATH=$PATH:/path/to/tool/directory
  3. Save the file and exit the text editor.

  4. Reload your Zsh configuration to apply the changes:

    source ~/.zshrc

Now, you can run Gazilion the Brute from any directory using:

python3 brute.py

Usage

Options

  • -m : Method of the request 'get', 'post'
  • -t : Target URL
  • -p : Protocol options are 'http', 'https'
  • -hR: Hide response status code
  • -w : Path to the wordlist file (default: default_wordlist.txt)
  • -h: Help

Example

Run the tool with the following command:

python3 brute.py -t 'https://your-target.com' -m post -p https -hR 500,404 -w custom_wordlist.txt

Connect with me on

1.0.1

5 months ago

1.0.0

5 months ago