Intro • Run it • Use it • Disclaimer
This project was assigned as a pet project for work. It is not meant to be used as a practical tool, but as an educational demonstration.
This tries to demonstrate the underlying code behind bruteforce network attacks, both to websites and emails.
To run the application, simply invoke it with the appropriate flags for it to function. Using the --help
flag will show a list of the available flags and options. Any missing flags for the code to function will be indicated on the terminal window.
python3 bruteforcer.py --help
$(pwd)/bruteforcer.py --help
This project depends on
python3
and the following python libraries:argparse
requests
imaplib
The application will execute the actions indicated by the entered flags and then promptly exit. If any other actions are desired, run the program again using different flags.
I do not condone the use of this software in any way that breaks the law, as it was made entirely for educational purposes.
The software is offered as is, and I do not take responsibility for any kind of misuse.