Skip to main content

Simple general purpose python bruteforce library

Project description

perock

Description

Perock is Python brute-force attack library built on threads and asyncio. Its intended for simplifying brute-force attack by performing common tasks in brute-force such as calculating cartesian product.

Perock was built to be general purpose in that it can be used for wide variety of brute-force attack activities. It can be used with html forms, file with passwords, API requiring username and password, etc.

Perock is currently undergoing major changes as mentioned in issue #44.

Broote is a wrapper around perock with all its features and but different API.

License

Perock is released as open-source under conditions of GPL-3.0 license.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

perock-0.2.2.tar.gz (72.7 kB view details)

Uploaded Source

Built Distribution

perock-0.2.2-py3-none-any.whl (48.4 kB view details)

Uploaded Python 3

File details

Details for the file perock-0.2.2.tar.gz.

File metadata

  • Download URL: perock-0.2.2.tar.gz
  • Upload date:
  • Size: 72.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.10.0

File hashes

Hashes for perock-0.2.2.tar.gz
Algorithm Hash digest
SHA256 fd8c3d43052d4a68d772ed9409060576144403bc84de0cf5b08fd72220f9977a
MD5 8f335736e757d5549bf1fe436a7ae185
BLAKE2b-256 aea1278811e4756e6a90a085d3693e3d0f793ff80733e666cf8c7b3806488d54

See more details on using hashes here.

File details

Details for the file perock-0.2.2-py3-none-any.whl.

File metadata

  • Download URL: perock-0.2.2-py3-none-any.whl
  • Upload date:
  • Size: 48.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.10.0

File hashes

Hashes for perock-0.2.2-py3-none-any.whl
Algorithm Hash digest
SHA256 ee78d32971708984f6089d8e1dc99822859b07ca5e125c5b9d876e8409adc12b
MD5 bd54a0aff35710cfa7d01bf723736382
BLAKE2b-256 b58de443ab92c206849f600b4722208fa81443be8205147d69c33024c7630bf2

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page