Jump to content

Registrations are Open Only for Limited Period !

After Registration's Clossed Only invite system will work

Registration of this forum is open for limited time to collect the Great Team for Cracking.

Don't be late to be the part of this community Soon the registration will be closed and invite system will work for registration

Only staff will get invite access to invite more peoples
and only users who buy Vip or Super user rank will get invite code for registration.

Staff Required

Staff Required

If you are  a Cracker Config maker Developer's or Exploiter show your Cracking Skills and get chance to be the staff team of CrackingCrew.

Complete the formalities and then submit your application for staff.

Read all the rules and follow the rules 

Good News LetsBruteit 2018 V. Updated By HNB


- Bug on in

version (11/06/2018)

- 'no user agent' added in user agent list. If you do not have it, just add it. Useful in some configs
  where you don't need to send user agent in request.

valid chars corrected (some filters were not accurate)
- Parsing function added to additionals redirect stage <<RS1VAR>> <<RS2VAR>>...<<RS7VAR>>
  These vars can be used in all successive stages.
- [ADV][empty] function added in SOURCE keys to intercept an Empty Source (with good header)
- When exporting config, Source FK on Login Stage were not exported! Corrected!
- Thanks to @klean from crackingcrew.com for the new Logo! ^^
- Protected config function added! You can now send a config as tool. The config can not be edited!
  When Bruteit loads it you can just add combo and/or proxies and bruteforce.

Recommended Posts



(tutorial to how to make dorks)


Step 1) Open SQLi Dumper, remove all dorks in "main" tab, go to "Proxies List" and copy your proxies, click on the clipboard paste sybmol "append" select your proxy type, and import.

Click test proxies, do threads 250 timeout 5.

After check do right click -> select all then we can start with main part.


Step 2) Open Dork list, paste dorks into main. Click "Start Scanner" - Wait until checker has been completed. (You can stop the scanner after 1k links, but for best result let it run over night)


Step 3) Go to "SQL Injection", start exploiter . If the exploiter found vulnerable links, then you can see it.


Step 4) After the exploitation has been finished(or stopped earlier), click on the "+" and add "email", then click again, and add "pwd", 3rd click on "+" and add "password". It will add automatically the user and so on. Select all by CTRL+A and click on "Start Search".


Step 5) After search has been completed, and you've found URL, select the URL, click on "Go To Dumper" —> "New Dumper Instance" it will open the website in a Schema. If the Database is "service" and the Column is "User", then select "User" and hit "Get Columns". After columns collect you can see a checkbox of every collected column.


Step 6) Select the check boxes of the columns you like, for example "username", "password", "email" and click "Dump Data". Sometimes password columns are closer than email, so format will "password:email" to change this you can select password, and click the arrow down to exchange it with the email.


Step 7) After data has been dumped, click on export, Delimiter -> Custom -> : then choose the Columns you want to export and click "Start"


SQLi Dumper:

You can find it on hacking tools section

Link to post
Share on other sites
  • Create New...

Important Information