Swarm - Bruteforcing penetration tool.

Swarm – Bruteforcing penetration tool.

Disclaimer:
THIS IS FOR EDUCATION OR RESEARCH USE ONLY. AUTHOR DOES NOT CONDONE ANY USE FOR ATTEMPT TO GAIN UNAUTHORIZED ACCESS TO SOMEONE ELSES ACCOUNT and/or PROPERTY. DO NOT USE ON A DOMAIN/PROPERTY THAT DOES NOT BELONG TO YOU, OR YOU DO NOT HAVE PERMISSION TO DO SO! USE AT YOUR OWN RISK!! AND ABOVE ALL ELSE – ENJOY 😉

SWARM is a bruteforce utility for HTML login forms.
The speed of SWARM greatly depends upon how fast your connection/computer are. The better the processor the faster, and more (if specified) threads SWARM executes. The quicker your connection, the faster POST requests can be made.

Swarm

Swarm

DEPENDENCIES:
+ folder contents – all the files within swarm directory
+ bitarray – used with bloomfilter
command: pip install bitarray
requests – how swarm makes POST/GET requests
Command: pip install requests
+ requests[socks] – allows tor to be used with swarm
Command: pip install -U requests[socks]
+ pexpect – Used in SSHHive for ssh login attempts
Command: pip install pexpect
* tor – If you want to use tor, tor must be installed
apt-get install tor – on Debian
yum –install tor – on Red Hat Based linux

Usage and Download From Source:

Source: https://github.com/szech696