https://github.com/falkern/brute-force-email
A simple Python script that attempts to brute-force an email account's password using a list of passwords provided.
https://github.com/falkern/brute-force-email
brute-force hacking password python tools
Last synced: 10 months ago
JSON representation
A simple Python script that attempts to brute-force an email account's password using a list of passwords provided.
- Host: GitHub
- URL: https://github.com/falkern/brute-force-email
- Owner: Falkern
- Created: 2024-11-06T02:40:29.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-11-06T02:48:28.000Z (about 1 year ago)
- Last Synced: 2025-01-24T13:16:06.065Z (12 months ago)
- Topics: brute-force, hacking, password, python, tools
- Language: Python
- Homepage:
- Size: 15.3 MB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Brute-Force Email Script
This script attempts to brute-force an email account's password using a list of passwords provided in a file named `Passwords.txt`. It supports Gmail and Live/Hotmail email providers.
[Use this repo to get a dictionary](https://github.com/kennyn510/wpa2-wordlists/tree/master)
## Features
- Supports Gmail and Live/Hotmail email providers.
- Resumes from the last attempted password in case of interruption.
- Random sleep intervals to prevent account lockout.
## Requirements
- Python 3.x
- `Passwords.txt` file containing a list of passwords to try, one per line.
## Usage
1. Clone the repository or download the script.
2. Ensure you have a `Passwords.txt` file in the same directory as the script.
3. Run the script:
```sh
python brute-force-email.py
```
4. Follow the prompts to select your email provider and enter the email address to test.
## Important Notes
- This script is for educational purposes only. Do not use it for illegal activities.
- Unauthorized access to email accounts is illegal and unethical.
- Use this script responsibly and only on accounts you own or have explicit permission to test.
## Disclaimer
The author is not responsible for any misuse of this script. Use it at your own risk.