NiX Brute Force – Parallel Log-in Brute Forcing/Password Cracking Tool

Outsmart Malicious Hackers


NiX Brute Forcer is a tool that uses brute force in parallel to log into a system without having authentication credentials beforehand. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of NiX is to support a variety of services that allow remote authentication such as: MySQL, SSH, FTP, IMAP. It is based on NiX Proxy Checker.

Features

  • Basic Authorization & FORM support in both standard and HTTPS (SSL) mode
  • HTTP/SOCKS 4 and 5 proxy support
  • FORM auto-detection & Manual FORM input configuration.
  • It is multi-threaded
  • Wordlist shuffling via macros
  • Auto-removal of dead or unreliable proxy and when site protection mechanism blocks the proxy
  • Integrated proxy randomization to defeat certain protection mechanisms
  • With Success and Failure Keys results are 99% accurate
  • Advanced coding and timeout settings makes it outperform any other brute forcer

The full changelog including the latest version is here.

You can download NiX Brute Force here:

NIX_BruteForce.bz2

Or read more here.

Posted in: Hacking Tools, Networking Hacking, Password Cracking

, , ,


Latest Posts:


BootStomp - Find Bootloader Vulnerabilities BootStomp – Find Android Bootloader Vulnerabilities
BootStomp is a Python-based tool, with Docker support that helps you find two different classes of bootloader vulnerabilities and bugs.
Google Chrome Marking ALL Non-HTTPS Sites Insecure July 2018 Google Chrome Marking ALL Non-HTTPS Sites Insecure July 2018
Google is ramping up its campaign against HTTP only sites and is going to mark ALL Non-HTTPS sites insecure in July 2018 with the release of Chrome 68.
altdns - Subdomain Recon Tool With Permutation Generation altdns – Subdomain Recon Tool With Permutation Generation
Altdns is a subdomain recon tool in Python that allows for the discovery of subdomains that conform to patterns. The tool takes in words that could be present in subdomains under a domain (such as test, dev, staging) as well as takes in a list of subdomains that you know of.
0-Day Flash Vulnerability Exploited In The Wild 0-Day Flash Vulnerability Exploited In The Wild
So another 0-Day Flash Vulnerability is being exploited in the Wild, a previously unknown flaw which has been labelled CVE-2018-4878 and it affects 28.0.0.137 and earlier versions
dorkbot - Command-Line Tool For Google Dorking dorkbot – Command-Line Tool For Google Dorking
dorkbot is a modular command-line tool for Google dorking, which is performing vulnerability scans against a set of web pages returned by Google search queries in a given Google Custom Search Engine.
USBPcap - USB Packet Capture For Windows USBPcap – USB Packet Capture For Windows
USBPcap is an open-source USB Packet Capture tool for Windows that can be used together with Wireshark in order to analyse USB traffic without using a Virtual Machine.


4 Responses to NiX Brute Force – Parallel Log-in Brute Forcing/Password Cracking Tool

  1. lawrence February 15, 2011 at 5:14 am #

    i do like all the tools you provide are very good tools

  2. NIX February 19, 2011 at 12:51 pm #

    Thanks, happy to hear positive feedback. Needless to say, I have put a good amount of my time on those tools.

    There will be updates as soon as I have time.

  3. Anonymous February 20, 2011 at 2:02 pm #

    [*] Initializing…

    [+] Mode: STD Brute type: BASIC Timeout: 20 Retries: 4 Retry delay: 4 sec. Threads: 10
    [+] Going to brute with 3 proxies and 24020 combos… approximately 8006 requests per proxy.

    [-] Error: RAMDISK/TMP

    Any suggestion?

    • NIX March 2, 2011 at 6:31 pm #

      A new version (1.1.2) has been released yesterday which fixes the above error. I forgot to disable the ramdisk requirement for the release version which is actually otherwise exactly the same as my development version. Download a new version from http://myproxylists.com/nix-brute-force

      Here’s CHANGELOG for 1.1.2

      Headers were fixed in non-SSL FORM mode when using a SQUID proxy.
      Site and proxy protection mechanism detection was improved.

      If a cookie is received from the site in BASIC AUTH mode, it is now
      considered a possible “HIT”, regardless of a reply or success and failure
      keys.

      A “days left information” was added to the estimated time left function. The default configuration file now has better examples

      PS. The next version will have new protocols supported. Im quite busy with various other projects and work though.

      You may want also try out NiX Proxy Checker: http://myproxylists.com/proxy-checker

      I can assure it’s the most reliable proxy checker out there with good features ;)

      Im not monitoring this thread that often, if you think you have found an error, you should in first place contact me using the email address listed at my site.

      That email box is monitored usually many times daily.