NiX Brute Force – Parallel Log-in Brute Forcing/Password Cracking Tool

Outsmart Malicious Hackers


NiX Brute Forcer is a tool that uses brute force in parallel to log into a system without having authentication credentials beforehand. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of NiX is to support a variety of services that allow remote authentication such as: MySQL, SSH, FTP, IMAP. It is based on NiX Proxy Checker.

Features

  • Basic Authorization & FORM support in both standard and HTTPS (SSL) mode
  • HTTP/SOCKS 4 and 5 proxy support
  • FORM auto-detection & Manual FORM input configuration.
  • It is multi-threaded
  • Wordlist shuffling via macros
  • Auto-removal of dead or unreliable proxy and when site protection mechanism blocks the proxy
  • Integrated proxy randomization to defeat certain protection mechanisms
  • With Success and Failure Keys results are 99% accurate
  • Advanced coding and timeout settings makes it outperform any other brute forcer

The full changelog including the latest version is here.

You can download NiX Brute Force here:

NIX_BruteForce.bz2

Or read more here.

Posted in: Hacking Tools, Networking Hacking, Password Cracking

, , ,


Latest Posts:


StaCoAn - Mobile App Static Analysis Tool StaCoAn – Mobile App Static Analysis Tool
StaCoAn is a cross-platform tool which aids developers, bug bounty hunters and ethical hackers performing mobile app static analysis on the code of the application for both native Android and iOS applications.
snallygaster - Scan For Secret Files On HTTP Servers snallygaster – Scan For Secret Files On HTTP Servers
snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are accessible that shouldn't be public and can pose a s
Portspoof - Spoof All Ports Open & Emulate Valid Services Portspoof – Spoof All Ports Open & Emulate Valid Services
The primary goal of the Portspoof program is to enhance your system security through a set of new camouflage techniques which spoof all ports open and also emulate valid services on every port.
Cambridge Analytica Facebook Data Scandal Cambridge Analytica Facebook Data Scandal
One of the biggest stories of the year so far has been the scandal surrounding Cambridge Analytica that came out after a Channel 4 expose that demonstrated the depths they are willing to go to profile voters, manipulate elections and much more.
GetAltName - Discover Sub-Domains From SSL Certificates GetAltName – Discover Sub-Domains From SSL Certificates
GetAltName it's a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers.
Memcrashed - Memcached DDoS Exploit Tool Memcrashed – Memcached DDoS Exploit Tool
Memcrashed is a Memcached DDoS exploit tool written in Python that allows you to send forged UDP packets to a list of Memcached servers obtained from Shodan.


4 Responses to NiX Brute Force – Parallel Log-in Brute Forcing/Password Cracking Tool

  1. lawrence February 15, 2011 at 5:14 am #

    i do like all the tools you provide are very good tools

  2. NIX February 19, 2011 at 12:51 pm #

    Thanks, happy to hear positive feedback. Needless to say, I have put a good amount of my time on those tools.

    There will be updates as soon as I have time.

  3. Anonymous February 20, 2011 at 2:02 pm #

    [*] Initializing…

    [+] Mode: STD Brute type: BASIC Timeout: 20 Retries: 4 Retry delay: 4 sec. Threads: 10
    [+] Going to brute with 3 proxies and 24020 combos… approximately 8006 requests per proxy.

    [-] Error: RAMDISK/TMP

    Any suggestion?

    • NIX March 2, 2011 at 6:31 pm #

      A new version (1.1.2) has been released yesterday which fixes the above error. I forgot to disable the ramdisk requirement for the release version which is actually otherwise exactly the same as my development version. Download a new version from http://myproxylists.com/nix-brute-force

      Here’s CHANGELOG for 1.1.2

      Headers were fixed in non-SSL FORM mode when using a SQUID proxy.
      Site and proxy protection mechanism detection was improved.

      If a cookie is received from the site in BASIC AUTH mode, it is now
      considered a possible “HIT”, regardless of a reply or success and failure
      keys.

      A “days left information” was added to the estimated time left function. The default configuration file now has better examples

      PS. The next version will have new protocols supported. Im quite busy with various other projects and work though.

      You may want also try out NiX Proxy Checker: http://myproxylists.com/proxy-checker

      I can assure it’s the most reliable proxy checker out there with good features ;)

      Im not monitoring this thread that often, if you think you have found an error, you should in first place contact me using the email address listed at my site.

      That email box is monitored usually many times daily.