- Known issues addressed
1st issue
As of | Upgrade ❄️ | Changes 💬 |
---|---|---|
28, Feb. | Brute was optimized for less resource consumption | |
11, March. | You can now create custom password dictionary with just keywords. Video | |
19, March. |
📜Fixed known issues 📜Main menu ui/ux. 📜Enter keyword clear from main menu to clean redundant histories. 📜Brute now tracks progress, making sure you can always resume from where you last stopped during bruteforce. 📜A new pattern has been added to the custom dictionary generator. |
generate.py is no longer isolated. Enter keyword password from main to write custom dictionary 🧨 However, the path in which the dictionaries are written/saved remains unchanged. |
20, March. |
📜Improved ui feel 📜Brute accuracy and error handling tweaked 📜Memory issue fixed : ValueError. 📜Setting is now made dynamic, eliminating the necessity of restarting the software to apply the changes made. |
|
14, April |
📜You can now enter CTRL-C to close brute force sessions without necessarily terminating the whole script. Took me long enough 🗿 |
I disclaim responsibility of how this tool is used, users are responsible for ensuring compliance with legal and ethical guidelines. Proceed responsibly.
Ethical Facebook and Gmail password brute force beast... With proxy rotation for every attack based on user preference setup, you can also add your custom password list. Got a few more tricks in its arsenal, you should go find out.
The codes are dynamic, ensuring the software's capability to receive updates in the future as development proceeds.
Get the app from F-droid
Use the enter key to select. Once that has been concluded, proceed with the following commands
apt update
apt upgrade
pkg install git
pkg install python3
pkg install x11-repo -y
pkg install tur-repo -y
pkg install chromium -y
git clone https://github.com/harkerbyte/linux-monster
bash setup.sh -f requirements.txt
Full YouTube tutorial on how to setup Linux-Monster
Main : This is the software's power house, containing every attack job the package could possibly offer. Its interface is made simple for users to navigate.
Global keyword - exit
Every password found is saved in data/temps.txt
Migrate : This should be the next thing you touch, incase you have decided to enable proxy. It interface is also made simple for users to comprehend, consider it a native proxy formatter.
Trust me, only this can refactor your imported proxies to a format that main.py can understand and work with.
Server (unstable) : This is specifically made for brute force attacks only when proxy is enabled. For the best performance, be sure you have provided migrate with premium proxies. Otherwise, you are likely to face proxy issues
CTRL + C To close server when not in usePros | Cons |
---|---|
Speed : In this scenario, you're simply running a local proxy server. Which ensures equal speed and privacy, as you can monitor the logs of what requests come in and the responses that are sent out. | Heavy : it consumes a massive amount of resources to keep its connections stable and accurate, which could lead to lag for low-end users, or even force quits. |
Interoperability: a friend of yours who is close by has the server running? You can use his/her server to save yourself a wealth of resources by making sure you both are on the same WiFi network. | Heavier : as the server has to run multiple requests, this could result in increased resource usage. This could overall ruin your relationship in case you never informed the other party beforehand. |
Monster.log : Monster.log: Here are the logs of every error encountered during attack jobs. Please make sure to provide this when reaching out to report an error that is out of scope. Possible: tracebacks.
Update : Run this from time to time, to make sure your copy is up to date.
For any dictionary generated, it's saved in the password folder from which main sources it passwords for attacks.