NiX Brute Force – Parallel Log-in Brute Forcing/Password Cracking Tool


NiX Brute Forcer is a tool that uses brute force in parallel to log into a system without having authentication credentials beforehand. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of NiX is to support a variety of services that allow remote authentication such as: MySQL, SSH, FTP, IMAP. It is based on NiX Proxy Checker.

Features

  • Basic Authorization & FORM support in both standard and HTTPS (SSL) mode
  • HTTP/SOCKS 4 and 5 proxy support
  • FORM auto-detection & Manual FORM input configuration.
  • It is multi-threaded
  • Wordlist shuffling via macros
  • Auto-removal of dead or unreliable proxy and when site protection mechanism blocks the proxy
  • Integrated proxy randomization to defeat certain protection mechanisms
  • With Success and Failure Keys results are 99% accurate
  • Advanced coding and timeout settings makes it outperform any other brute forcer

The full changelog including the latest version is here.

You can download NiX Brute Force here:

NIX_BruteForce.bz2

Or read more here.

Posted in: Hacking Tools, Networking Hacking, Password Cracking

, , ,


Latest Posts:


zBang - Privileged Account Threat Detection Tool zBang – Privileged Account Threat Detection Tool
zBang is a risk assessment tool for Privileged Account Threat Detection on a scanned network, organizations & red teams can use it to identify attack vectors
Memhunter - Automated Memory Resident Malware Detection Memhunter – Automated Memory Resident Malware Detection
Memhunter is an Automated Memory Resident Malware Detection tool for the hunting of memory resident malware at scale, improving threat hunter analysis process.
Sandcastle - AWS S3 Bucket Enumeration Tool Sandcastle – AWS S3 Bucket Enumeration Tool
Sandcastle is an Amazon AWS S3 Bucket Enumeration Tool, formerly known as bucketCrawler. The script takes a target's name as the stem argument (e.g. shopify).
Astra - API Automated Security Testing For REST Astra – API Automated Security Testing For REST
Astra is a Python-based tool for API Automated Security Testing, REST API penetration testing is complex due to continuous changes in existing APIs.
Judas DNS - Nameserver DNS Poisoning Attack Tool Judas DNS – Nameserver DNS Poisoning Attack Tool
Judas DNS is a Nameserver DNS Poisoning Attack Tool which functions as a DNS proxy server built to be deployed in place of a taken over nameserver to perform targeted exploitation.
dsniff Download - Tools for Network Auditing & Password Sniffing dsniff Download – Tools for Network Auditing & Password Sniffing
Dsniff download is a collection of tools for network auditing & penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, URLsnarf, and WebSpy passively monitor a network


4 Responses to NiX Brute Force – Parallel Log-in Brute Forcing/Password Cracking Tool

  1. lawrence February 15, 2011 at 5:14 am #

    i do like all the tools you provide are very good tools

  2. NIX February 19, 2011 at 12:51 pm #

    Thanks, happy to hear positive feedback. Needless to say, I have put a good amount of my time on those tools.

    There will be updates as soon as I have time.

  3. Anonymous February 20, 2011 at 2:02 pm #

    [*] Initializing…

    [+] Mode: STD Brute type: BASIC Timeout: 20 Retries: 4 Retry delay: 4 sec. Threads: 10
    [+] Going to brute with 3 proxies and 24020 combos… approximately 8006 requests per proxy.

    [-] Error: RAMDISK/TMP

    Any suggestion?

    • NIX March 2, 2011 at 6:31 pm #

      A new version (1.1.2) has been released yesterday which fixes the above error. I forgot to disable the ramdisk requirement for the release version which is actually otherwise exactly the same as my development version. Download a new version from http://myproxylists.com/nix-brute-force

      Here’s CHANGELOG for 1.1.2

      Headers were fixed in non-SSL FORM mode when using a SQUID proxy.
      Site and proxy protection mechanism detection was improved.

      If a cookie is received from the site in BASIC AUTH mode, it is now
      considered a possible “HIT”, regardless of a reply or success and failure
      keys.

      A “days left information” was added to the estimated time left function. The default configuration file now has better examples

      PS. The next version will have new protocols supported. Im quite busy with various other projects and work though.

      You may want also try out NiX Proxy Checker: http://myproxylists.com/proxy-checker

      I can assure it’s the most reliable proxy checker out there with good features ;)

      Im not monitoring this thread that often, if you think you have found an error, you should in first place contact me using the email address listed at my site.

      That email box is monitored usually many times daily.