GitHunt
HA

HackfutSec/PhpBruter

**PhpBruter** is an advanced security testing tool designed for professional penetration testers to assess the security of phpMyAdmin installations.

Here's a comprehensive README.md file for your GitHub repository:

# PhpBruter - phpMyAdmin Enterprise Pentesting Tool

![Banner](https://freeimage.host/i/screenshot-2025-06-24-1.FTnzmqg)

**PhpBruter** is an advanced security testing tool designed for professional penetration testers to assess the security of phpMyAdmin installations. This enterprise-grade tool provides multiple attack vectors to test authentication security with features like credential brute-forcing, password spraying, and custom wordlist attacks.

## Features

- ๐Ÿš€ **Multi-mode operation** (Default scan, Wordlist attack, Single test, Password spray)
- ๐Ÿ”’ **Thread-safe operations** with configurable thread limits
- ๐Ÿ“Š **Results persistence** (Automatically saves found credentials to JSON)
- ๐ŸŒ **Proxy support** for routing traffic through intermediaries
- ๐Ÿ•ต๏ธ **IP rotation** with random X-Forwarded-For headers
- โฑ๏ธ **Performance metrics** with response time tracking
- ๐ŸŽจ **Color-coded output** for easy result interpretation
- ๐Ÿ“ **Wordlist validation** with proper error handling

## Installation

1. Clone the repository:
```bash
git clone https://github.com/HackfutSec/PhpBruter.git
cd PhpBruter
  1. Install dependencies:
pip install requests colorama

Usage

Basic usage:

python3 phpmyadmin_pentest.py [target_url]

Or run without arguments for interactive mode:

python3 phpmyadmin_pentest.py

Modes Available:

  1. Default Credential Scan - Tests common phpMyAdmin credentials
  2. Custom Wordlist Attack - Uses provided username and password wordlists
  3. Single Credential Test - Tests one specific username/password combination
  4. Password Spray Attack - Tests one username against a password wordlist

Configuration

Edit the CONFIG dictionary in the script to customize:

CONFIG = {
    "user_agents": [...],  # Customize user agents
    "default_users": [...],  # Add default usernames
    "default_passwords": [...],  # Add default passwords
    "timeout": 15,  # Request timeout
    "delay": 1.5,  # Delay between attempts
    "max_threads": 5,  # Maximum concurrent threads
    "results_file": "scan_results.json",  # Output file
    "proxy": None  # Configure proxies if needed
}

Sample Wordlists

Example wordlists are provided in the wordlists/ directory:

  • common_users.txt - Common phpMyAdmin usernames
  • common_passwords.txt - Common phpMyAdmin passwords

โš ๏ธ This tool is for authorized security testing and educational purposes only.
The developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use on systems you own or have permission to test.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Contributing

Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.

Screenshot

Sample Usage

Languages

Python100.0%

Contributors

MIT License
Created June 24, 2025
Updated June 24, 2025