This post is by a banned member (VolCoder) - Unhide
OP 14 March, 2024 - 07:09 AM
Reply
This is Source Code In C#
XSSMetaBruter
Functions
Show ContentSpoiler:
1. Checking public logs and deleting them using the method of searching for keywords such as "Cloud", "Free logs" in the log names and in the UserInformation file.
2. Checking and removing executable files from logs.
3. Using ready-made password dictionaries.
4. Generating passwords based on passwords from logs.
5. Self-replenishing password dictionary, consisting of verified logs and passwords generated from logs.
6. Multithreading.
7. Monitoring the time spent on brute force.
8. Monitoring successful and unsuccessful brute force.
Advantage
Show ContentSpoiler:
This software is superior to any MetaMask wallet parsers, at least in that you do not need to search for and try passwords to log in, which can be quite problematic. The brute forcer will independently find all MetaMask wallets and search for passwords not only from the logs, but also generate new ones based on those obtained from the logs. And if this doesn’t help, then you can use your own personal password dictionary, which, by the way, will be automatically updated after each brute force.
Setup and Compiling
Show ContentSpoiler:
1. Run XSSMetaBruter.sln.
2. Open and modify the config.json file to suit your needs, located along the path \XSSMetaBruter\bin\Release.
Designation of values in config.json:
"pass_dictionary": Path to the finished dictionary.
"threads": Number of threads.
"delete_empty_logs": Whether or not to delete empty logs.
"newdict_path": Path to the file where new passwords for your dictionary will be written.
"check_virus": Removing exe files from logs.
"check_cloud": Checking for logs from the cloud.
"delete_cloud": Deleting logs from the cloud. 3. In Visual Studio, compile the project in Release mode.
4. Run the resulting exe file.
5. Drag the folder with logs to the console that opens and press Enter.
6. Wait for the brute force to finish; the results will be saved in a txt file next to your brute forcer exe file.
Download Link
Hidden Content
You must register or login to view this content.
Don't Leech and leave like
This post is by a banned member (DexOFFss) - Unhide
15 March, 2024 - 12:44 AM
Reply
(14 March, 2024 - 07:09 AM)VolCoder Wrote: Show MoreThis is Source Code In C#
XSSMetaBruter
Functions
Show ContentSpoiler:
1. Checking public logs and deleting them using the method of searching for keywords such as "Cloud", "Free logs" in the log names and in the UserInformation file.
2. Checking and removing executable files from logs.
3. Using ready-made password dictionaries.
4. Generating passwords based on passwords from logs.
5. Self-replenishing password dictionary, consisting of verified logs and passwords generated from logs.
6. Multithreading.
7. Monitoring the time spent on brute force.
8. Monitoring successful and unsuccessful brute force.
Advantage
Show ContentSpoiler:
This software is superior to any MetaMask wallet parsers, at least in that you do not need to search for and try passwords to log in, which can be quite problematic. The brute forcer will independently find all MetaMask wallets and search for passwords not only from the logs, but also generate new ones based on those obtained from the logs. And if this doesn’t help, then you can use your own personal password dictionary, which, by the way, will be automatically updated after each brute force.
Setup and Compiling
Show ContentSpoiler:
1. Run XSSMetaBruter.sln.
2. Open and modify the config.json file to suit your needs, located along the path \XSSMetaBruter\bin\Release.
Designation of values in config.json:
"pass_dictionary": Path to the finished dictionary.
"threads": Number of threads.
"delete_empty_logs": Whether or not to delete empty logs.
"newdict_path": Path to the file where new passwords for your dictionary will be written.
"check_virus": Removing exe files from logs.
"check_cloud": Checking for logs from the cloud.
"delete_cloud": Deleting logs from the cloud. 3. In Visual Studio, compile the project in Release mode.
4. Run the resulting exe file.
5. Drag the folder with logs to the console that opens and press Enter.
6. Wait for the brute force to finish; the results will be saved in a txt file next to your brute forcer exe file.
Download Link
Don't Leech and leave like
tyy
This post is by a banned member (DFSGTR666) - Unhide
15 March, 2024 - 08:39 AM
Reply
(14 March, 2024 - 07:09 AM)VolCoder Wrote: Show MoreThis is Source Code In C#
XSSMetaBruter
Functions
Show ContentSpoiler:
1. Checking public logs and deleting them using the method of searching for keywords such as "Cloud", "Free logs" in the log names and in the UserInformation file.
2. Checking and removing executable files from logs.
3. Using ready-made password dictionaries.
4. Generating passwords based on passwords from logs.
5. Self-replenishing password dictionary, consisting of verified logs and passwords generated from logs.
6. Multithreading.
7. Monitoring the time spent on brute force.
8. Monitoring successful and unsuccessful brute force.
Advantage
Show ContentSpoiler:
This software is superior to any MetaMask wallet parsers, at least in that you do not need to search for and try passwords to log in, which can be quite problematic. The brute forcer will independently find all MetaMask wallets and search for passwords not only from the logs, but also generate new ones based on those obtained from the logs. And if this doesn’t help, then you can use your own personal password dictionary, which, by the way, will be automatically updated after each brute force.
Setup and Compiling
Show ContentSpoiler:
1. Run XSSMetaBruter.sln.
2. Open and modify the config.json file to suit your needs, located along the path \XSSMetaBruter\bin\Release.
Designation of values in config.json:
"pass_dictionary": Path to the finished dictionary.
"threads": Number of threads.
"delete_empty_logs": Whether or not to delete empty logs.
"newdict_path": Path to the file where new passwords for your dictionary will be written.
"check_virus": Removing exe files from logs.
"check_cloud": Checking for logs from the cloud.
"delete_cloud": Deleting logs from the cloud. 3. In Visual Studio, compile the project in Release mode.
4. Run the resulting exe file.
5. Drag the folder with logs to the console that opens and press Enter.
6. Wait for the brute force to finish; the results will be saved in a txt file next to your brute forcer exe file.
Download Link
Don't Leech and leave like
SDFVTR SDFVTR
This post is by a banned member (Lixiviado) - Unhide
16 March, 2024 - 09:43 PM
Reply
This post is by a banned member (hughesdi) - Unhide
17 March, 2024 - 10:35 AM
Reply
[font][font]thanks for the pshare my friend[/font][/font]
This post is by a banned member (cheeseydeez) - Unhide
17 March, 2024 - 02:50 PM
(This post was last modified: 17 March, 2024 - 02:51 PM by cheeseydeez.)
Reply
ily bro
ty sm bro this helped a lot i will use this fs
This post is by a banned member (sala108) - Unhide
18 March, 2024 - 02:51 PM
Reply
(14 March, 2024 - 07:09 AM)VolCoder Wrote: Show MoreThis is Source Code In C#
XSSMetaBruter
Functions
Show ContentSpoiler:
1. Checking public logs and deleting them using the method of searching for keywords such as "Cloud", "Free logs" in the log names and in the UserInformation file.
2. Checking and removing executable files from logs.
3. Using ready-made password dictionaries.
4. Generating passwords based on passwords from logs.
5. Self-replenishing password dictionary, consisting of verified logs and passwords generated from logs.
6. Multithreading.
7. Monitoring the time spent on brute force.
8. Monitoring successful and unsuccessful brute force.
Advantage
Show ContentSpoiler:
This software is superior to any MetaMask wallet parsers, at least in that you do not need to search for and try passwords to log in, which can be quite problematic. The brute forcer will independently find all MetaMask wallets and search for passwords not only from the logs, but also generate new ones based on those obtained from the logs. And if this doesn’t help, then you can use your own personal password dictionary, which, by the way, will be automatically updated after each brute force.
Setup and Compiling
Show ContentSpoiler:
1. Run XSSMetaBruter.sln.
2. Open and modify the config.json file to suit your needs, located along the path \XSSMetaBruter\bin\Release.
Designation of values in config.json:
"pass_dictionary": Path to the finished dictionary.
"threads": Number of threads.
"delete_empty_logs": Whether or not to delete empty logs.
"newdict_path": Path to the file where new passwords for your dictionary will be written.
"check_virus": Removing exe files from logs.
"check_cloud": Checking for logs from the cloud.
"delete_cloud": Deleting logs from the cloud. 3. In Visual Studio, compile the project in Release mode.
4. Run the resulting exe file.
5. Drag the folder with logs to the console that opens and press Enter.
6. Wait for the brute force to finish; the results will be saved in a txt file next to your brute forcer exe file.
Download Link
Don't Leech and leave like
woooooo
This post is by a banned member (titosan1891) - Unhide
18 March, 2024 - 03:09 PM
Reply
(14 March, 2024 - 07:09 AM)VolCoder Wrote: Show MoreThis is Source Code In C#
XSSMetaBruter
Functions
Show ContentSpoiler:
1. Checking public logs and deleting them using the method of searching for keywords such as "Cloud", "Free logs" in the log names and in the UserInformation file.
2. Checking and removing executable files from logs.
3. Using ready-made password dictionaries.
4. Generating passwords based on passwords from logs.
5. Self-replenishing password dictionary, consisting of verified logs and passwords generated from logs.
6. Multithreading.
7. Monitoring the time spent on brute force.
8. Monitoring successful and unsuccessful brute force.
Advantage
Show ContentSpoiler:
This software is superior to any MetaMask wallet parsers, at least in that you do not need to search for and try passwords to log in, which can be quite problematic. The brute forcer will independently find all MetaMask wallets and search for passwords not only from the logs, but also generate new ones based on those obtained from the logs. And if this doesn’t help, then you can use your own personal password dictionary, which, by the way, will be automatically updated after each brute force.
Setup and Compiling
Show ContentSpoiler:
1. Run XSSMetaBruter.sln.
2. Open and modify the config.json file to suit your needs, located along the path \XSSMetaBruter\bin\Release.
Designation of values in config.json:
"pass_dictionary": Path to the finished dictionary.
"threads": Number of threads.
"delete_empty_logs": Whether or not to delete empty logs.
"newdict_path": Path to the file where new passwords for your dictionary will be written.
"check_virus": Removing exe files from logs.
"check_cloud": Checking for logs from the cloud.
"delete_cloud": Deleting logs from the cloud. 3. In Visual Studio, compile the project in Release mode.
4. Run the resulting exe file.
5. Drag the folder with logs to the console that opens and press Enter.
6. Wait for the brute force to finish; the results will be saved in a txt file next to your brute forcer exe file.
Download Link
Don't Leech and leave like
nice
|