Metadata-Version: 2.4
Name: linux-monster
Version: 1.6.9
Summary: A bruteforce tool, built and packaged for resilience. Purpose: strictly for penetration testing only
Author: Shade
Author-email: adesolasherifdeen3@gmail.com
License: GPL-3.0
Project-URL: GitHub, https://github.com/harkerbyte
Project-URL: Facebook, https://facebook.com/harkerbyte
Project-URL: Whatsapp, https://whatsapp.com/channel/0029Vb5f98Z90x2p6S1rhT0S
Project-URL: Youtube, https://youtube.com/@harkerbyte
Project-URL: Instagram, https://instagram.com/harkerbyte
Classifier: License :: OSI Approved :: GNU General Public License v3 (GPLv3)
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.11
Classifier: Operating System :: OS Independent
Requires-Python: >=3.11
Description-Content-Type: text/markdown
License-File: LICENSE
Requires-Dist: requests
Requires-Dist: selenium==4.9.1
Requires-Dist: beautifulsoup4
Requires-Dist: flask
Dynamic: author
Dynamic: author-email
Dynamic: classifier
Dynamic: description
Dynamic: description-content-type
Dynamic: license
Dynamic: license-file
Dynamic: project-url
Dynamic: requires-dist
Dynamic: requires-python
Dynamic: summary


![GitHub Repo stars](https://img.shields.io/github/stars/harkerbyte/linux-monster?style=plastic&logo=Github)
![GitHub forks](https://img.shields.io/github/forks/harkerbyte/linux-monster?style=plastic)
![GitHub Issues or Pull Requests](https://img.shields.io/github/issues/harkerbyte/linux-monster?style=plastic&logo=Github)

![PyPI - Version](https://img.shields.io/pypi/v/linux-monster?color=blue&label=PyPI)
[![PyPI Downloads](https://static.pepy.tech/personalized-badge/linux-monster?period=total&units=INTERNATIONAL_SYSTEM&left_color=BLACK&right_color=BLUE&left_text=downloads)](https://pepy.tech/projects/linux-monster)

![Platform](https://img.shields.io/badge/platform-linux%20%7C%20macos%20%7C%20windows%20%7C%20android-lightgrey)
![License](https://img.shields.io/pypi/l/linux-monster?color=yellow)

### Issues Addressed
<a href="https://github.com/harkerbyte/linux-monster/issues/1">  Issue #1</a>
<a href="https://github.com/harkerbyte/linux-monster/issues/2">Issue #2</a>
<a href="https://github.com/harkerbyte/linux-monster/issues/3">
Issue #3</a> 
<a href="https://github.com/harkerbyte/linux-monster/issues/4" >Issue #4</a>
### Changelog
<table>
  <tr>
    <th>As of</th>
    <th>Upgrade ❄️</th>
    <th>Changes 💬</th>
  </tr>
  <tr>
    <td>28, Feb.</td>
    <td>Brute was optimized for less resource consumption </td>
  </tr>
  <tr>
    <td>11, March.</td>
    <td>You can now create custom password dictionary with just keywords. <a href="https://youtu.be/ewQfgRUeGU4?si=alPRccErnA-hwwjz" >Video</a></td>
  </tr>
  <tr>
    <td>19, March.</td>
    <td>
  📜Fixed known issues</br>
  📜Main menu ui/ux.</br>
  📜Enter keyword <b>clear</b> from main menu to clean redundant histories.</br>
  📜Brute now tracks progress, making sure you can always resume from where you last stopped during bruteforce.</br>
  📜A new pattern has been added to the custom dictionary generator.</td>
  <td>
    <mark>generate.py</mark> is no longer isolated. Enter keyword password from <b>main</b> to write custom dictionary 🧨</br>
  However, the path in which the dictionaries are written/saved remains <b>unchanged</b>.
  </td>
  </tr>
  <tr>
    <td>20, March. </td>
    <td>
      📜Improved ui feel </br>
      📜Brute accuracy and error handling tweaked</br>
      📜Memory issue fixed : <b>ValueError</b>.</br>     
      📜Setting is now made dynamic, eliminating the necessity of restarting the software to apply the changes made. 
    </td>
  </tr>
  <tr>
    <td>
      14, April
    </td>
    <td>
      📜You can now enter <b>CTRL-C</b> to close brute force sessions without necessarily terminating the whole script.<br>
      Took me long enough 🗿
    </td>
  </tr>
  <tr>
    <td>
      25, May
    </td>
    <td>
      Brute speed 📈</br>
      📜Tweaked error handling and facebook captcha detection
    </td>
  </tr>
  <tr>
    <td>
      1, Dec 2025
    </td>
    <td>
      📜Bug fixed: AttributeError & json DecodeError
    </td>
    <td>
      📜You can now Ctrl-c during payload session</br>
      📜.gitignore updated
    </td>
  </tr>
 <tr> 
  <td>
  21, Feb 2026
  </td>
  <td> 
   📜Migration to pypi</br>
   📜Proper error handling</br>
   📜Memory issue has now been fixed</br>
   📜Brute operation further optimised towards lesser memory consumption
  </td>
  <td> 
  New keyword added : refresh</br>
  You can now pip install linux-monster</br>
  Brute automatically continues from where ever you last stopped, courtesy of memory</br>
  python -m update is no longer a thing, simply pip install linux-monster to always stay upto date.</br>
  </td>
 </tr>
 
</table>


### Disclaimer 
<a href = "https://facebook.com/harkerbyte">![Facebook](https://img.shields.io/badge/Facebook-%231877F2.svg?style=plastic&logo=Facebook&logoColor=white)</a>
<a href ="https://youtube.com/@harkerbyte?si=aPSIREosLJlFOmyX" >![YouTube](https://img.shields.io/badge/YouTube-%23FF0000.svg?style=plastic&logo=YouTube&logoColor=white)</a>
<a href="https://whatsapp.com/channel/0029Vb5f98Z90x2p6S1rhT0S">![WhatsApp](https://img.shields.io/badge/WhatsApp-25D366?style=plastic&logo=whatsapp&logoColor=white)</a>
<a href="https://instagram.com/harkerbyte" >
![Instagram](https://img.shields.io/badge/Instagram-E4405F?style=plastic&amp;logo=instagram&amp;logoColor=white) </a>
<a href="https://x.com/shade_ofx?t=MF53V_O7YhHlDUiWqNqtRA&s=09"> 
![X (formerly Twitter) Follow](https://img.shields.io/twitter/follow/shade_ofx?style=plastic&logo=X&label=%20&color=blue)</a></br>
<b>I disclaim responsibility of how this tool is used, users are responsible for ensuring compliance with legal and ethical guidelines. Proceed responsibly.</b>

![1000015654](https://github.com/user-attachments/assets/1551359a-0761-4d17-88e1-5951d778c93f)

### linux-monster
<b> Ethical Facebook and Gmail </b> password brute force beast... With proxy rotation for every attack based on user preference setup, you can also add your custom password list. 
Got a few more tricks in its arsenal, you should go find out. 

The codes are dynamic, ensuring the software's capability to receive updates in the future as development proceeds. 

<a href="https://youtube.com/@harkerbyte?si=bueGE1-JUuVj2uNW">Community Goal 🗿</a>
### Setup
Get the app from <a title="F-droid termux" href="https://f-droid.org/en/packages/com.termux/" >F-droid</a>

![1000076644](https://github.com/user-attachments/assets/46f61565-bdae-499e-9d93-3effb62ecb0c)

<b>Use the enter key to select.</b>
  Once that has been concluded, proceed with the following commands
  
```  
 apt update
 apt upgrade
 pkg install git
 pkg install python3
 pkg install x11-repo -y
 pkg install tur-repo -y
 pkg install chromium -y
```
### pip version
```
pip install linux-monster
linux-monster
```
### github version
```
git clone https://github.com/harkerbyte/linux-monster
cd linux-monster
pip install .
cd 
linux-monster
```
[![SETUP TUTORIAL YT](https://github.com/harkerbyte/linux-monster/blob/06f6a0867368aa5b0ec853f38253da9409e1399a/data/IMG_20250302_182932.png)](https://www.youtube.com/harkerbyte)
<b>Full YouTube tutorial on how to setup Linux-Monster</b>


<div id="support" >
  <h3>Support</h5>
  For users who have concluded with the installation process...
  <b>Here are the contents of the tool package and how to use it.</b>
  
  
[![Termux brute force tool - working 100%](https://github.com/harkerbyte/linux-monster/blob/06f6a0867368aa5b0ec853f38253da9409e1399a/data/IMG_20250302_183022.png)](https://www.youtube.com/harkerbyte)

```bash 
linux-monster
```
<p><b>Main</b> : This is the software's power house, containing every attack job the package could possibly offer. Its interface is made simple for users to navigate. </p>
  <p><b> Global keyword - exit </b></br>
  <b>Every password found is saved in data/temps.txt</b>
  </p>
  

![1000078602](https://github.com/user-attachments/assets/cc4e1f78-0500-48b1-b67f-10cee1751ae4)

```bash
linux-monster-migrate
```
<p><b>Migrate</b> : This should be the next thing you touch, incase you have decided to enable proxy. It interface is also made simple for users to comprehend, consider it a native proxy formatter.
  
Trust me, only this can refactor your imported proxies to a format the software can understandand work with.</p>

![1000078431](https://github.com/user-attachments/assets/35f9900c-f94a-4ce4-b6ba-5314d7d61c36)

```bash
linux-monster-server
```
<p><b>Server (unstable)</b> : This is specifically made for brute force attacks only when proxy is enabled. For the best performance, be sure you have provided migrate with premium proxies. Otherwise, you are likely to face proxy issues</p>
  <kbd>CTRL + C</kbd> To close server when not in use
  <table>
    <tr>
      <th>
        Pros
      </th>
      <th>
        Cons
      </th>
    </tr>
    <tr>
      <td>
        Speed : In this scenario, you're simply running a local proxy server. Which ensures equal speed and privacy, as you can monitor the logs of what requests come in and the responses that are sent out.
      </td>
      <td>
        Heavy : it consumes a massive amount of resources to keep its connections stable and accurate, which could lead to lag for low-end users, or even force quits.
      </td>
    </tr>
    <tr>
      <td>
        Interoperability: a friend of yours who is close by has the server running? You can use his/her server to save yourself a wealth of resources by making sure you both are on the same WiFi network.
      </td>
      <td>
        Heavier : as the server has to run multiple requests, this could result in increased resource usage. This could overall ruin your relationship in case you never informed the other party beforehand.
      </td>
    </tr>
    
  </table>

```bash
linux-monster-log
```
<p><b>Monster.log</b> : Here are the logs of every error encountered during attack jobs. Please make sure to provide this when reaching out to report an error that is out of scope. Possible: tracebacks. </p>

![1000079316](https://github.com/user-attachments/assets/6c8e0c71-c251-4f28-99d3-5c2a0a72593f)

</br>For any dictionary generated, it's saved in the password folder from which <b>linux-monster</b> sources it passwords for attacks. </p>
<b>See this <a href="https://youtu.be/ewQfgRUeGU4?si=alPRccErnA-hwwjz" >video</a> for more clarity</b>

</div>
