The Advanced SSH Brute Force Tool is intended for use in security testing environments and for educational purposes. It makes use of sophisticated capabilities to try SSH brute-force assaults, making efficient use of multi-threaded operations and a polished user interface.
Disclaimer: Unauthorized access to computer systems is illegal and unethical. This tool is intended solely for use in authorized security testing and educational environments.
- Advanced Encryption: Utilizes Fernet encryption for secure management of sensitive data.
- Multi-Protocol Support: Allows selection between SSH, FTP, and HTTP for attacks (currently focused on SSH).
- Dynamic Progress Tracking: Includes a dynamic progress bar to monitor the status of brute-force attacks.
- Customizable Credentials: Supports single or multiple usernames and passwords.
- Automated Results Saving: Automatically saves successful credentials with timestamped filenames.
- Professional UI: Enhanced user interface with color-coded outputs and clear instructions.
-
Clone the Repository
git clone https://github.com/nexussecelite/Advanced-SSH-Brute-Force-Tool.git cd Advanced-SSH-Brute-Force-Tool
-
Install Dependencies
Ensure you have
pip
installed, then run:pip install -r requirements.txt
Dependencies include:
paramiko
for SSH connections.tqdm
for progress bars.cryptography
for encryption.colorama
for colored terminal output.
-
Run the Tool
python brute_force_tool.py
-
Follow the Prompts
The tool will prompt you for the following inputs:
- Target Host IP: The IP address of the SSH server you wish to test.
- Port: The port number for SSH (default is 22).
- Number of Threads: The number of concurrent threads to use (default is 10).
- Username Input Method: Choose between 'single' for one username or 'multi' for a list of usernames.
- Username List File (if 'multi' is selected): Path to the file containing a list of usernames.
- Password List File: Path to the file containing a list of passwords.
-
View Results
Successful login attempts will be displayed and saved in a file named
results_<host>_<timestamp>.txt
.
Enter the target Host IP: 192.168.1.100
Enter the port (default 22 for SSH): 22
Enter the number of threads to use (default 10): 10
Enter 'single' for a single username or 'multi' for a list of usernames: multi
Enter the path to the username list file: usernames.txt
Enter the path to the password list file: passwords.txt
- Encryption Key Management: The encryption key (
FERNET_KEY
) can be configured for managing encrypted data. Modify theFERNET_KEY
value in the script as needed. - Logging: Detailed logs are stored in
advanced_tool.log
for troubleshooting and record-keeping.
If you'd like to contribute to this project, please fork the repository and submit a pull request with your changes. Ensure that your contributions align with the tool’s intended educational and ethical use.
This project is licensed under the MIT License - see the LICENSE file for details.
For any questions or issues, please contact at [hello@nexussec.in].