NiX Brute Force – Parallel Log-in Brute Forcing/Password Cracking Tool


NiX Brute Forcer is a tool that uses brute force in parallel to log into a system without having authentication credentials beforehand. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of NiX is to support a variety of services that allow remote authentication such as: MySQL, SSH, FTP, IMAP. It is based on NiX Proxy Checker.

Features

  • Basic Authorization & FORM support in both standard and HTTPS (SSL) mode
  • HTTP/SOCKS 4 and 5 proxy support
  • FORM auto-detection & Manual FORM input configuration.
  • It is multi-threaded
  • Wordlist shuffling via macros
  • Auto-removal of dead or unreliable proxy and when site protection mechanism blocks the proxy
  • Integrated proxy randomization to defeat certain protection mechanisms
  • With Success and Failure Keys results are 99% accurate
  • Advanced coding and timeout settings makes it outperform any other brute forcer

The full changelog including the latest version is here.

You can download NiX Brute Force here:

NIX_BruteForce.bz2

Or read more here.

Posted in: Hacking Tools, Networking Hacking Tools, Password Cracking Tools

, , ,


Latest Posts:


Socialscan - Command-Line Tool To Check For Email And Social Media Username Usage Socialscan – Command-Line Tool To Check For Email And Social Media Username Usage
socialscan is an accurate command-line tool to check For email and social media username usage on online platforms, given an email address or username,
CFRipper - CloudFormation Security Scanning & Audit Tool CFRipper – CloudFormation Security Scanning & Audit Tool
CFRipper is a Python-based Library and CLI security analyzer that functions as an AWS CloudFormation security scanning and audit tool
CredNinja - Test Credential Validity of Dumped Credentials or Hashes CredNinja – Test Credential Validity of Dumped Credentials or Hashes
CredNinja is a tool to quickly test credential validity of dumped credentials (or hashes) across an entire network or domain very efficiently.
assetfinder - Find Related Domains and Subdomains assetfinder – Find Related Domains and Subdomains
assetfinder is a Go-based tool to find related domains and subdomains that are related to a given domain from a variety of sources including Facebook and more.
Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.


4 Responses to NiX Brute Force – Parallel Log-in Brute Forcing/Password Cracking Tool

  1. lawrence February 15, 2011 at 5:14 am #

    i do like all the tools you provide are very good tools

  2. NIX February 19, 2011 at 12:51 pm #

    Thanks, happy to hear positive feedback. Needless to say, I have put a good amount of my time on those tools.

    There will be updates as soon as I have time.

  3. Anonymous February 20, 2011 at 2:02 pm #

    [*] Initializing…

    [+] Mode: STD Brute type: BASIC Timeout: 20 Retries: 4 Retry delay: 4 sec. Threads: 10
    [+] Going to brute with 3 proxies and 24020 combos… approximately 8006 requests per proxy.

    [-] Error: RAMDISK/TMP

    Any suggestion?

    • NIX March 2, 2011 at 6:31 pm #

      A new version (1.1.2) has been released yesterday which fixes the above error. I forgot to disable the ramdisk requirement for the release version which is actually otherwise exactly the same as my development version. Download a new version from http://myproxylists.com/nix-brute-force

      Here’s CHANGELOG for 1.1.2

      Headers were fixed in non-SSL FORM mode when using a SQUID proxy.
      Site and proxy protection mechanism detection was improved.

      If a cookie is received from the site in BASIC AUTH mode, it is now
      considered a possible “HIT”, regardless of a reply or success and failure
      keys.

      A “days left information” was added to the estimated time left function. The default configuration file now has better examples

      PS. The next version will have new protocols supported. Im quite busy with various other projects and work though.

      You may want also try out NiX Proxy Checker: http://myproxylists.com/proxy-checker

      I can assure it’s the most reliable proxy checker out there with good features ;)

      Im not monitoring this thread that often, if you think you have found an error, you should in first place contact me using the email address listed at my site.

      That email box is monitored usually many times daily.