⚠️ Important (Read first): This project is strictly for educational, research and defensive purposes only.
Do NOT use this tool against real online services, third-party accounts, or systems you do not own or do not have explicit written permission to test. Unauthorized brute-force attacks are illegal and may result in account bans, IP blocks, and legal consequences.
This repository contains a simple Brute Force Tester intended for offline/lab use and learning how password guessing tools work.
It is designed to be Pydroid-friendly (Android) and also runnable on normal Python environments.
It does NOT target real services by default — instead use the bundled login mode for safe practice.
⚠️ The project demonstrates mechanics only: reading a wordlist, attempting logins locally, and reporting results. It does not include code to perform attacks against external networks/services out of the box.
- Simple, readable Python code (beginner-friendly)
- Works in Pydroid (Android) and desktop Python
- Wordlist support (plain text, one password per line)
- Clear output and basic progress reporting
- Helpful error messages (file not found, path typos, etc.)
- Python 3.7+ (or Pydroid 3 on Android)
- A plain text password wordlist (one password per line) for testing
- Recommended: run in an isolated environment (local VM / test account)
- Clone the repo:
https://github.com/eisaalsa555/Brute-force.git python main.py
1.Instagram username to test: example_515
2.Enter path to password wordlist file: /storage/emulated/0/pass.txt If You Use Kali Then /home/kali/ If You Want To Use Our Defoult Password List Then Use Only pass.txt