Skip to main content

FCKR – The Ultimate Brute Forcer

Project description

FCKR – The Ultimate Brute-Forcer

FCKR is a powerful CLI tool for penetration testers and security researchers that performs:

  • HTTP brute forcing (placeholder replacement & parameter fuzzing)
  • XSS reflection testing (exact payload match detection)

Supports both:

  • Traditional mode using FCK placeholder
  • Raw request mode using full HTTP request files

Developed by @IMApurbo ⚠️ Use responsibly. Authorized testing only.


🚀 Features

🔹 Dual Modes

  • brute — wordlist-based brute forcing
  • xss — reflected XSS detection

🔹 Traditional Mode

Place FCK in:

  • URL (GET fuzzing)
  • Body (POST fuzzing)

Each wordlist entry replaces FCK.

🔹 Raw Request Mode (-R)

Supports full HTTP request files:

POST /login HTTP/1.1
Host: example.com
Content-Type: application/json

{"user":"admin","pass":"FCK"}

Raw mode features include:

  • Auto-extract method, URL, headers, and body
  • Parameter-specific fuzzing (-p param)
  • FCK placeholder substitution when -p is not used
  • JSON, form, query, and fallback raw-body fuzzing

Real behaviors matched to your code:

  • JSON → parsed/replaced as dict
  • Form data → parsed with parse_qs()
  • Unknown content-type → fallback string replace
  • Missing parameter → warning printed

🔹 Parameter-Specific Fuzzing (-p)

Fuzzes:

  • Query parameters
  • JSON keys
  • Form-encoded fields

Missing key → warning.

🔹 URL Encoding Support (--encode)

Payloads encoded using quote().

🔹 Header Merging (-H)

Headers added using this format:

Header1:Value;Header2:Value

Invalid format → warning.

🔹 Filtering (-f)

Supports:

Field Meaning
s status code
l content length
c body content

Types:

  • e → exact
  • c → contains
  • nc → not contains

🔹 Debug Mode (-d)

Displays:

  • Requests sent
  • Filter mismatches
  • Non-reflected XSS payloads

🔹 Threading (-T)

Uses ThreadPoolExecutor Default: 10 threads

🔹 Fetch Raw Response (-r)

Fetch raw HTML for a specific word/payload.


📦 Installation

pip install fckr

⚙️ Usage

fckr <mode> <options>

Modes

Mode Description
brute Wordlist brute forcing
xss XSS reflection testing

🧰 Options

Common Options

Option Description
-u, --url URL containing FCK
-b, --body POST body containing FCK
-w, --wordlist Wordlist file
-m, --method GET/POST
-H, --header Extra headers
-t, --timeout Timeout (seconds)
-T, --threads Thread count
-d, --debug Debug mode
-o, --output Save results to file
-r, --fetch-response Fetch full raw HTML
--encode URL-encode payloads

Raw Request Options

Option Description
-R HTTP raw request file
-p Fuzz specific parameter (query/json)

Notes (matches your code exactly)

  • -u or -R required

  • In raw mode:

    • -u, -b, -mignored
    • If no -p → FCK replacement used
  • JSON/form/query all supported

  • Unknown content-type → fallback string replace

  • Missing parameter → warning shown


🔍 Filter Syntax

<field>:<type>:<value>

Examples:

-f s:e:200
-f c:nc:error
-f c:c:"success"
-f l:e:1024

🔧 Examples

1️⃣ Simple GET Brute

fckr brute -u "https://test.com/?id=FCK" -w ids.txt

2️⃣ POST Brute

fckr brute -u "https://test.com/login" -b "user=admin&pass=FCK" -w pass.txt

3️⃣ Raw Request Placeholder (FCK)

fckr brute -R req.txt -w list.txt

4️⃣ Raw Request + Parameter Fuzzing

fckr brute -R req.txt -p password -w pass.txt

5️⃣ Fetch Full Response

fckr brute -u "https://a.com/?q=FCK" -w list.txt -r admin

6️⃣ XSS Reflection Test

fckr xss -u "https://test.com/?q=FCK" -w payloads.txt --encode

7️⃣ Raw JSON XSS

fckr xss -R req.txt -p search -w payloads.txt

📂 Wordlist Examples

Brute-force list:

admin
test123
root

XSS payload list:

<script>alert(1)</script>
<img src=x onerror=alert(1)>

🛠 Development

git clone https://github.com/IMApurbo/fckr
cd fckr
pip install -r requirements.txt

Run:

python -m fckr brute -u "https://example.com/?q=FCK" -w list.txt

⚠️ Legal Disclaimer

Use only with explicit permission. Unauthorized testing is illegal.


⭐ Credits

Created by: IMApurbo


📃 License

This project is licensed under the MIT License. See the LICENSE file for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

fckr-1.3-py3-none-any.whl (13.1 kB view details)

Uploaded Python 3

File details

Details for the file fckr-1.3-py3-none-any.whl.

File metadata

  • Download URL: fckr-1.3-py3-none-any.whl
  • Upload date:
  • Size: 13.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for fckr-1.3-py3-none-any.whl
Algorithm Hash digest
SHA256 39f50787de1a35f5cff940b05aaf9f1d04ea6da236e5142b39d71c8ffcb394fb
MD5 172ade3ae4496a198ca6e325036539cd
BLAKE2b-256 53ec9b38a4eb74f514638da347b5a368aefb69556cd7247680e758d9698502b8

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page