BruteForceAI Tool Automates Login Page Detection and Smart Brute-Force Attacks

5g (14)

BruteForceAI, created by security researcher Mor David, is a modern penetration testing tool that combines large language models (LLMs) with browser automation to automatically detect login forms and perform advanced brute-force testing.

By merging AI-powered form analysis, evasion strategies, and detailed logging, this framework makes credential-testing faster and more efficient, helping security professionals quickly uncover weak authentication systems.

Two-Stage Working Process

At the heart of BruteForceAI is a two-step approach:

Stage 1: AI-Powered Login Form Detection

The system uses LLMs (via Ollama or Groq) to scan HTML code and detect login form elements with up to 95% accuracy in real-world scenarios.
It reviews page structures, input fields, and submission endpoints, then generates CSS selectors required for the next phase of testing.

Stage 2: Smart Attack Execution

In this stage, BruteForceAI conducts multi-threaded brute-force attempts with AI-discovered selectors. Users can select between two modes:

  • Brute-Force Mode: Tests every possible username/password combination.
  • Password-Spray Mode: Uses each password across multiple usernames, lowering the chance of account lockouts.

The tool employs feedback-based learning, DOM-change detection, and human-like timing patterns to improve success rates and bypass security defenses.

Key Features of BruteForceAI

Feature CategoryCapabilities
Multi-Threading1–100+ threads with smart delay handling
Evasion TechniquesRandom User-Agent rotation, proxy support, jitter control, hidden browser mode
Notifications & LogsReal-time alerts (Discord, Slack, Teams, Telegram), SQLite logs, detailed output
Operational ToolsAuto-updates, retry system, database cleanup, colored terminal interface

The tool also offers webhook integration for instant credential success alerts and detailed SQLite logs for reviewing every attempt.

Database management features include schema inspection and cleanup, while results can also be exported to files for analysis.

Installation and Setup

BruteForceAI requires Python 3.8+, Playwright browsers, and common libraries like requests and PyYAML.

Installation Steps:

  1. Clone the GitHub repository
  2. Run: pip install -r requirements.txt
  3. Configure your preferred LLM option:
  • Local (Ollama): Use models like llama3.2:3b for balance or llama3.2:1b for speed.
  • Cloud (Groq): Authenticate with an API key and choose llama-3.3-70b-versatile (recommended) or lightweight options like gemma2-9b-it.

Usage Commands:

  • Analyze targets
python main.py analyze --urls targets.txt --llm-provider ollama --llm-model llama3.2:3b
python main.py attack --urls targets.txt --usernames users.txt --passwords passwords.txt --threads 20 --delay 5 --jitter 2

Ethical Use

BruteForceAI is built only for authorized penetration testing, research, and education. Any misuse on unauthorized systems is both illegal and unethical. Organizations should always operate within an approved scope, and the developer takes no responsibility for unlawful use.

Conclusion

By combining AI, automation, and evasion strategies, BruteForceAI represents a new evolution in credential testing tools, giving red teams and security auditors the power to find authentication flaws with greater speed, stealth, and accuracy.