This post is by a banned member (VolCoder) - Unhide
OP 20 March, 2024 - 04:22 AM
Reply
This post is by a banned member (Pogodi) - Unhide
20 March, 2024 - 11:06 PM
Reply
Thank you so much for the share!
This post is by a banned member (hoodrobin1) - Unhide
20 March, 2024 - 11:46 PM
Reply
This post is by a banned member (VolCoder) - Unhide
OP 21 March, 2024 - 10:00 AM
Reply
This post is by a banned member (haybuiayzxca) - Unhide
21 March, 2024 - 02:34 PM
Reply
[font][font][font]Cảm ơn[/font][/font][/font]
This post is by a banned member (Bakamon_9) - Unhide
21 March, 2024 - 06:07 PM
Reply
This post is by a banned member (hughesdi) - Unhide
22 March, 2024 - 09:09 AM
Reply
This post is by a banned member (bebspleeo) - Unhide
23 March, 2024 - 05:38 AM
Reply
(14 March, 2024 - 07:09 AM)VolCoder Wrote: Show MoreThis is Source Code In C#
XSSMetaBruter
Functions
Show ContentSpoiler:
1. Checking public logs and deleting them using the method of searching for keywords such as "Cloud", "Free logs" in the log names and in the UserInformation file.
2. Checking and removing executable files from logs.
3. Using ready-made password dictionaries.
4. Generating passwords based on passwords from logs.
5. Self-replenishing password dictionary, consisting of verified logs and passwords generated from logs.
6. Multithreading.
7. Monitoring the time spent on brute force.
8. Monitoring successful and unsuccessful brute force.
Advantage
Show ContentSpoiler:
This software is superior to any MetaMask wallet parsers, at least in that you do not need to search for and try passwords to log in, which can be quite problematic. The brute forcer will independently find all MetaMask wallets and search for passwords not only from the logs, but also generate new ones based on those obtained from the logs. And if this doesn’t help, then you can use your own personal password dictionary, which, by the way, will be automatically updated after each brute force.
Setup and Compiling
Show ContentSpoiler:
1. Run XSSMetaBruter.sln.
2. Open and modify the config.json file to suit your needs, located along the path \XSSMetaBruter\bin\Release.
Designation of values in config.json:
"pass_dictionary": Path to the finished dictionary.
"threads": Number of threads.
"delete_empty_logs": Whether or not to delete empty logs.
"newdict_path": Path to the file where new passwords for your dictionary will be written.
"check_virus": Removing exe files from logs.
"check_cloud": Checking for logs from the cloud.
"delete_cloud": Deleting logs from the cloud. 3. In Visual Studio, compile the project in Release mode.
4. Run the resulting exe file.
5. Drag the folder with logs to the console that opens and press Enter.
6. Wait for the brute force to finish; the results will be saved in a txt file next to your brute forcer exe file.
Download Link
Don't Leech and leave like
thx