Skip to content
/ Erbus Public

A comprehensive tool with GUI for Brute Force attacks on X (Twitter), Instagram, etc. accounts, along with pydictor for password generation, as well as proxy health checks.

License

Notifications You must be signed in to change notification settings

G0odKid/Erbus

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Erebus v1.0


License Python Status Version

A comprehensive, multi-functional toolkit designed for penetration testing and security research, featuring a powerful GUI.

Erebus consolidates essential security tools into a single, user-friendly application. It eliminates the need for multiple separate scripts by providing a multi-threaded brute-force module, an intelligent and highly customizable password generation engine, and a reliable proxy checker, all wrapped in a sleek and modern graphical interface.

📸 Screenshots


ScreenShot1

Features

Erebus is packed with features to streamline your security testing workflow:

🎯 Attack Operations Module

  • Multi-Service Support: Test against a wide range of popular services, including:

    • Twitter / X
    • Instagram
    • Facebook
    • Reddit
    • TikTok
    • Yahoo Mail
    • Microsoft Accounts
    • Discord
    • Epic Games
    • Netflix
    • Spotify
  • Multi-Threaded: Run attacks with a configurable number of threads for high-speed testing.

  • Full Proxy Support: Route traffic through a proxy list to maintain anonymity and avoid rate limits.

  • Advanced Controls: Fine-tune your operations with settings for connection timeouts and delays between attempts.

  • Live Feedback: Monitor progress in real-time with a live log, success/fail counters, and a progress bar.

⚙️ Comprehensive Password Engine

  • Powered by the versatile pydictor engine, this module offers multiple generation methods:

    • Chunk Mode: Intelligently combines personal information (names, nicknames, birth years, etc.) to create highly targeted wordlists.

    • Base Mode: Generates passwords based on a specified character set (digits, lowercase, uppercase, custom).

    • Extend Mode: Adds prefixes and suffixes to an existing wordlist.

    • Advanced & Plugin Modes: Utilize powerful pydictor plugins like birthday and ftp, or define complex generation rules and patterns.

    • Transformations & Filters: Apply leet speak transformations, filter results with regex, and set length constraints.

    • Encoding Support: Encode the final wordlist using various algorithms (MD5, SHA1/256/512, Base64, etc.).

🌐 Proxy Health Checker

  • Bulk Checking: Quickly validate a large list of proxies from a file or direct text input.

  • Real-time Results: Proxies are sorted into "Live" and "Dead" lists as they are checked.

  • Save Functionality: Easily save the list of working proxies to a file for use in your attack operations.

🎨 Modern User Interface

  • Clean & Intuitive: A carefully designed GUI that is easy to navigate.

  • Light & Dark Themes: Switch between themes to suit your preference.

  • Multi-Language Support: Fully translated interface supporting both English and Persian (فارسی).

🚀 Installation & Setup

Erebus is built with Python and pywebview. Follow these steps to get it running:

Prerequisites:

  • Python 3.9 or newer

  • Google Chrome (for undetected-chromedriver)

Installation Steps:

  1. Clone the repository:
git clone https://github.com/G0odKid/Erbus
  1. Navigate to the project directory:
cd Erbus
  1. Install the required dependencies: (It is highly recommended to use a virtual environment)
pip install -r requirements.txt

(Note: requirements.txt should contain pywebview, undetected-chromedriver, and requests)

  1. Run the application:
python main.py

📖 How to Use

  1. Attack Operations:
  • Navigate to the "Attack Operations" tab.

  • Select the target service from the dropdown list.

  • Enter the target's username/email.

  • Paste your password list into the text area or use the "Password Engine" to generate one and transfer it over.

  • Click to select a proxy file (optional but recommended).

  • Adjust thread count and other settings.

  • Click "Start Operation".

  1. Password Generation:
  • Go to the "Password Engine" tab.

  • Choose your desired generation method (e.g., "Chunk").

  • Fill in the relevant input fields.

  • Configure transformations, rules, and encoding as needed.

  • Click "Generate Wordlist".

  • You can then copy the list, save it to a file, or send it directly to the Attack Operations module.

  1. Proxy Checking:
  • Go to the "Proxy Checker" tab.

  • Load your proxies from a file or paste them into the text area.

  • Click "Start Check" and monitor the results.

⚠️ Disclaimer

This tool is created solely for educational purposes and legal penetration testing on systems you have explicit permission to test. Any illegal or malicious use of this software is the user's responsibility, and the developer assumes no liability for its misuse. Please use it responsibly.

❤️ Credits & Acknowledgements*

This project was designed and developed by GoodKid.

The powerful password generation capabilities are made possible by the pydictor tool, created by LandGrey. A huge thank you for this incredible library.

📜 License

This project is licensed under the GNU General Public License v3.0. See the LICENSE file for details.

About

A comprehensive tool with GUI for Brute Force attacks on X (Twitter), Instagram, etc. accounts, along with pydictor for password generation, as well as proxy health checks.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published