Skip to content

Ethical Facebook and Gmail bruteforce... Bonus, proxy rotation for every attack based on user preference setting and also a web scrapping tool

Notifications You must be signed in to change notification settings

harkerbyte/linux-monster

Repository files navigation

GitHub Repo stars GitHub forks GitHub Issues or Pull Requests

Issues

Changelog

As of Upgrade ❄️ Changes 💬
28, Feb. Brute was optimized for less resource consumption
11, March. You can now create custom password dictionary with just keywords. Video
19, March. 📜Fixed known issues
📜Main menu ui/ux.
📜Enter keyword clear from main menu to clean redundant histories.
📜Brute now tracks progress, making sure you can always resume from where you last stopped during bruteforce.
📜A new pattern has been added to the custom dictionary generator.
generate.py is no longer isolated. Enter keyword password from main to write custom dictionary 🧨
However, the path in which the dictionaries are written/saved remains unchanged.
20, March. 📜Improved ui feel
📜Brute accuracy and error handling tweaked
📜Memory issue fixed : ValueError.
📜Setting is now made dynamic, eliminating the necessity of restarting the software to apply the changes made.
14, April 📜You can now enter CTRL-C to close brute force sessions without necessarily terminating the whole script.
Took me long enough 🗿

Disclaimer

Facebook YouTube WhatsApp Instagram X (formerly Twitter) Follow
I disclaim responsibility of how this tool is used, users are responsible for ensuring compliance with legal and ethical guidelines. Proceed responsibly.

1000015654

linux-monster

Ethical Facebook and Gmail password brute force beast... With proxy rotation for every attack based on user preference setup, you can also add your custom password list. Got a few more tricks in its arsenal, you should go find out.

The codes are dynamic, ensuring the software's capability to receive updates in the future as development proceeds.

Community Goal 🗿

Setup

Get the app from F-droid

1000076644

Use the enter key to select. Once that has been concluded, proceed with the following commands

 apt update
 apt upgrade
 pkg install git
 pkg install python3
 pkg install x11-repo -y
 pkg install tur-repo -y
 pkg install chromium -y
 git clone https://github.com/harkerbyte/linux-monster
 bash setup.sh -f requirements.txt

SETUP TUTORIAL YT Full YouTube tutorial on how to setup Linux-Monster

Support

For users who have concluded with the installation process... Here are the contents of the tool package and how to use it.

Termux brute force tool - working 100%

Main : This is the software's power house, containing every attack job the package could possibly offer. Its interface is made simple for users to navigate.

Global keyword - exit
Every password found is saved in data/temps.txt

1000078602

Migrate : This should be the next thing you touch, incase you have decided to enable proxy. It interface is also made simple for users to comprehend, consider it a native proxy formatter.

Trust me, only this can refactor your imported proxies to a format that main.py can understand and work with.

1000078431

Server (unstable) : This is specifically made for brute force attacks only when proxy is enabled. For the best performance, be sure you have provided migrate with premium proxies. Otherwise, you are likely to face proxy issues

CTRL + C To close server when not in use
Pros Cons
Speed : In this scenario, you're simply running a local proxy server. Which ensures equal speed and privacy, as you can monitor the logs of what requests come in and the responses that are sent out. Heavy : it consumes a massive amount of resources to keep its connections stable and accurate, which could lead to lag for low-end users, or even force quits.
Interoperability: a friend of yours who is close by has the server running? You can use his/her server to save yourself a wealth of resources by making sure you both are on the same WiFi network. Heavier : as the server has to run multiple requests, this could result in increased resource usage. This could overall ruin your relationship in case you never informed the other party beforehand.

Monster.log : Monster.log: Here are the logs of every error encountered during attack jobs. Please make sure to provide this when reaching out to report an error that is out of scope. Possible: tracebacks.

1000079316

Update : Run this from time to time, to make sure your copy is up to date.


For any dictionary generated, it's saved in the password folder from which main sources it passwords for attacks.

See this video for more clarity

About

Ethical Facebook and Gmail bruteforce... Bonus, proxy rotation for every attack based on user preference setting and also a web scrapping tool

Topics

Resources

Stars

Watchers

Forks

Sponsor this project