Skip to content

CodingChatRoom/WolfForce

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🐺 WolfForce - Brute Force Login Tool

 _       __      ____________                
| |     / /___  / / __/ ____/___  ___________
| | /| / / __ \/ /_/ /_  / __ \/ ___/ ___/ _ \
| |/ |/ / /_/ / / __/ __/ / /_/ / /  / /__/  __/
|__/|__/\____/_/_/ /_/    \____/_/   \___/\___/ 

🔐 Educational Use Only
❗ Do not use on real systems without permission.


For educational and authorized testing only.

WolfForce is a powerful brute force login tool for API-based login pages (JSON format). Focused on backend brute-forcing.

Features

  • Brute-force login
  • Eye-catching terminal UI
  • Fast & customizable
  • Works on Kali, Termux, Ubuntu, Windows

🔄 Multiple Login Types & Protocols

Feature Status Notes
JSON-based API Login ✅ Yes --format json
Form-based Login (HTML/PHP) ✅ Yes --format form
HTTP Methods (GET/POST) ✅ Yes --method GET / --method POST
Custom Field Names (email, username, etc.) ✅ Yes --userfield, --passfield
Interactive Wordlist Mode ✅ Yes --interactive
Localhost & Remote URL Support ✅ Yes Works for both environments

📦 Installation

✅ For Kali Linux / Ubuntu

sudo apt update
sudo apt install python3 python3-pip -y
git clone https://github.com/CodingChatRoom/WolfForce.git
cd WolfForce
sudo apt install python3-requests python3-termcolor python3-pyfiglet

✅ For Termux (Android)

pkg update
pkg install git python -y
git clone https://github.com/CodingChatRoom/WolfForce.git
cd WolfForce
pip install requests termcolor pyfiglet

✅ For Windows

💡 Make sure Python is installed from: https://www.python.org/downloads

git clone https://github.com/CodingChatRoom/WolfForce.git
cd WolfForce
pip install -r requirements.txt

🧪 Usage Examples

▶️ 1. Use Default Wordlists

python3 wolfforce.py --url http://localhost:3000/api/login

▶️ 2. Use Your Own Wordlists

python3 wolfforce.py --url http://localhost:3000/api/login --users my_users.txt --passwords my_passes.txt

▶️ 3. Interactive Mode

python3 wolfforce.py --url http://localhost:3000/api/login --interactive

▶️ 4. HTML or PHP Form Login

python3 wolfforce.py --url http://localhost/login.php --format form --userfield=username --passfield=password

▶️ 5. GET Method Support (if applicable)

python3 wolfforce.py --url http://localhost/login.php --method GET --format form

▶️ 6. POST Method Support (if applicable)

python3 wolfforce.py --url http://localhost/brute/index.html --method POST --format form --userfield email-or-number --passfield password

🧑‍💻 About the Author

Field Detail
Name Muhammad Saqlain Shoukat
Alias Dark Wolf 🐺
Channel Coding Chat Room
Email pakistanihacker295@gmail.com

🧠 “WolfForce hunts weak logins — not people.”Dark Wolf

📄 Disclaimer

This tool is made for educational and ethical hacking purposes only.
Do NOT use it on real systems without permission.
You are responsible for your own actions.

⭐ Support & Share

If you like this project:

  • 🌟 Star the repository
  • 📢 Share with your ethical hacking friends
  • 🎬 Subscribe to my YouTube channel
    ➡️ CODING CHAT ROOM

🐺 Crafted by Wolf for the ethical hacking community 💻

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages