{"id":25413940,"url":"https://github.com/intrd/nozzlr","last_synced_at":"2025-10-31T07:31:46.527Z","repository":{"id":76066215,"uuid":"84258608","full_name":"intrd/nozzlr","owner":"intrd","description":"DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly","archived":false,"fork":false,"pushed_at":"2023-01-11T21:59:41.000Z","size":2929,"stargazers_count":62,"open_issues_count":2,"forks_count":16,"subscribers_count":5,"default_branch":"1.1","last_synced_at":"2025-02-15T21:40:01.683Z","etag":null,"topics":["bruteforce","infosec","pentesting","python"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/intrd.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null}},"created_at":"2017-03-08T00:02:39.000Z","updated_at":"2024-11-10T21:14:56.000Z","dependencies_parsed_at":"2024-01-07T13:00:27.944Z","dependency_job_id":"63f42981-abfa-4913-8183-95c95a49fe7c","html_url":"https://github.com/intrd/nozzlr","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/intrd%2Fnozzlr","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/intrd%2Fnozzlr/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/intrd%2Fnozzlr/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/intrd%2Fnozzlr/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/intrd","download_url":"https://codeload.github.com/intrd/nozzlr/tar.gz/refs/heads/1.1","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":239140700,"owners_count":19588476,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bruteforce","infosec","pentesting","python"],"created_at":"2025-02-16T14:33:02.434Z","updated_at":"2025-10-31T07:31:46.062Z","avatar_url":"https://github.com/intrd.png","language":"Python","readme":"# Nozzlr v1.1\n\n[![Rawsec's CyberSecurity Inventory](http://list.rawsec.ml/img/badges/Rawsec-inventoried-FF5050_flat-square.svg)](http://list.rawsec.ml/tools.html#Nozzlr)\n\nNozzlr is a multithread bruteforcer, trully modular and script-friendly - **author**: intrd@dann.com.br \u0026 github collaborators\n\nThe other bruteforce tools are amazing, but the hardcoded parameters make it painful to script \nover complex tasks. Nozzlr comes to solve this problem. All your task parameters/engine is \nmanaged directly in the task template(a python script). \n\n![nozzlr](/nozzlr.gif?raw=true \"nozzlr bruteforcer\")\n\n```\nusage: nozzlr taskmodule wordlists threads [--offset] [--resume_each] [--quiet] [--repeats] [--help]\n\npositional arguments:\n  taskmodule            Task template filepath\n  wordlists             Wordlist paths(space separated, 2 max)\n  threads               The number of threads\n\noptional arguments:\n  -h, --help            show this help message and exit\n  --offset [OFFSET]     \u003e= 0 start from wordlist linenumber\n  --resume_each [RESUME_EACH]\n                        100 = default, save session every 1k tries\n  --quiet [QUIET]       Supress most of program output (saves CPU)\n  --repeats [REPEATS]   Loops the same wordlists N times, default=1\n\nJust copy one of this templates below to your working directory and customize to your needs.  \n\ndefault task templates:\n  templates/args_bruteforce.py : Commandline arguments bruteforcer (PoC: breaking ccrypt .cpt encrypted file)\n  templates/args_bruteforce.py : Commandline arguments bruteforcer (PoC: recovering SSH RSA private keys passphrase)\n  templates/args_gpgbruteforce.py : Commandline arguments bruteforcer (PoC: breaking GpG .gpg encrypted files)\n  templates/args_charbruteforce.py : Commandline arguments bruteforcer (PoC: char by char looping the same wordlist)\n  templates/stdin_bruteforce.py : STDIN - pipe inside commandline tools (PoC: bruteforcing LUKS)\n  templates/ftp_bruteforce.py : RAW FTP (PoC: proFTPd, but works w/ any other server)\n  templates/http_bruteforce.py : HTTP POST (PoC: bruteforcing pastd.com private notes)\n  templates/ssh_bruteforce.py : SSH login (PoC: openSSH bruteforce)\n  ...more at templates/\n\nThis is a proof-of-concept tool, any actions and or activities is solely your responsibility. \nThe misuse of this tool can result in criminal charges brought against the persons in question. \nThe authors and collaborators will not be held responsible in the event any criminal charges \nbe brought against any individuals misusing this tool to break the law.\n\n```\nYes! your tasktemplates/contributions are welcome :) \n\n## INSTALL\n```\ncd ~/ \u0026\u0026 git clone http://github.com/intrd/nozzlr appz/nozzlr \u0026\u0026 cd appz/nozzlr \\\n\u0026\u0026 wget -O libs/int_netcat.py https://gist.github.com/intrd/00a39c83f752acf81775bfa9721e745a/raw/ \\\n\u0026\u0026 sudo ln -s $PWD/nozzlr.py /usr/bin/nozzlr\n```\n\n## USAGE\nCopy selected task xxx_bruteforce.py from /samples to your working directory, edit, and run:\n```\nnozzlr templates/ssh_bruteforce.py wordlists/unix_users.txt wordlists/unix_passwords.txt 1\n```\n\n## UPDATE\n```\ncd ~/appz/nozzlr \u0026\u0026 git fetch --all \u0026\u0026 git reset --hard origin/1.1  \\\n\u0026\u0026 wget -O libs/int_netcat.py https://gist.github.com/intrd/00a39c83f752acf81775bfa9721e745a/raw/\n```\n\n## CHANGELIST\n```\nv1.1\n  - added SSH Passphrase - RSA private keys bruteforcer\n  - added Asterisk Call Management bruteforcer (port 5038)  \n  - added Wordpress bruteforce\n  - fixed gpg template\n  - added breaking ccrypt .cpt encrypted file\n  - added char by char looping the same wordlist\n  - now processing multiple wordlists\n```\n\n","funding_links":[],"categories":["Bruteforcers","Programming/Comp Sci/SE Things","Misc"],"sub_categories":["Password Lists"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fintrd%2Fnozzlr","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fintrd%2Fnozzlr","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fintrd%2Fnozzlr/lists"}