NiX Brute Force – Parallel Log-in Brute Forcing/Password Cracking Tool

The New Acunetix V12 Engine


NiX Brute Forcer is a tool that uses brute force in parallel to log into a system without having authentication credentials beforehand. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of NiX is to support a variety of services that allow remote authentication such as: MySQL, SSH, FTP, IMAP. It is based on NiX Proxy Checker.

Features

  • Basic Authorization & FORM support in both standard and HTTPS (SSL) mode
  • HTTP/SOCKS 4 and 5 proxy support
  • FORM auto-detection & Manual FORM input configuration.
  • It is multi-threaded
  • Wordlist shuffling via macros
  • Auto-removal of dead or unreliable proxy and when site protection mechanism blocks the proxy
  • Integrated proxy randomization to defeat certain protection mechanisms
  • With Success and Failure Keys results are 99% accurate
  • Advanced coding and timeout settings makes it outperform any other brute forcer

The full changelog including the latest version is here.

You can download NiX Brute Force here:

NIX_BruteForce.bz2

Or read more here.

Posted in: Hacking Tools, Networking Hacking, Password Cracking

, , ,


Latest Posts:


Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI
Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).
Malcom - Malware Communication Analyzer Malcom – Malware Communication Analyzer
Malcom is a Malware Communication Analyzer designed to analyze a system's network communication using graphical representations of network traffic.
WepAttack - WLAN 802.11 WEP Key Hacking Tool WepAttack – WLAN 802.11 WEP Key Hacking Tool
WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack.
Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.


4 Responses to NiX Brute Force – Parallel Log-in Brute Forcing/Password Cracking Tool

  1. lawrence February 15, 2011 at 5:14 am #

    i do like all the tools you provide are very good tools

  2. NIX February 19, 2011 at 12:51 pm #

    Thanks, happy to hear positive feedback. Needless to say, I have put a good amount of my time on those tools.

    There will be updates as soon as I have time.

  3. Anonymous February 20, 2011 at 2:02 pm #

    [*] Initializing…

    [+] Mode: STD Brute type: BASIC Timeout: 20 Retries: 4 Retry delay: 4 sec. Threads: 10
    [+] Going to brute with 3 proxies and 24020 combos… approximately 8006 requests per proxy.

    [-] Error: RAMDISK/TMP

    Any suggestion?

    • NIX March 2, 2011 at 6:31 pm #

      A new version (1.1.2) has been released yesterday which fixes the above error. I forgot to disable the ramdisk requirement for the release version which is actually otherwise exactly the same as my development version. Download a new version from http://myproxylists.com/nix-brute-force

      Here’s CHANGELOG for 1.1.2

      Headers were fixed in non-SSL FORM mode when using a SQUID proxy.
      Site and proxy protection mechanism detection was improved.

      If a cookie is received from the site in BASIC AUTH mode, it is now
      considered a possible “HIT”, regardless of a reply or success and failure
      keys.

      A “days left information” was added to the estimated time left function. The default configuration file now has better examples

      PS. The next version will have new protocols supported. Im quite busy with various other projects and work though.

      You may want also try out NiX Proxy Checker: http://myproxylists.com/proxy-checker

      I can assure it’s the most reliable proxy checker out there with good features ;)

      Im not monitoring this thread that often, if you think you have found an error, you should in first place contact me using the email address listed at my site.

      That email box is monitored usually many times daily.