BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
So I've seen some of the same issues on this thread but with no solutions.
I'm running Kali and have the newest version of Brutesploit.
I put all my commands in and it finds my wordlist and proxy fine. I have been using set thread 4 as that's what someone advised online. It scans my proxy list just fine, some fail, some pass.
When it comes to the actual attack (I'm using the 0e4) it's just printing [!] unknown error in request repeatedly.
So I've seen some of the same issues on this thread but with no solutions.
I'm running Kali and have the newest version of Brutesploit.
I put all my commands in and it finds my wordlist and proxy fine. I have been using set thread 4 as that's what someone advised online. It scans my proxy list just fine, some fail, some pass.
When it comes to the actual attack (I'm using the 0e4) it's just printing [!] unknown error in request repeatedly.
Any fix would be great
Thanks