This Repository contains brute force scripts using TOR Proxies to bypass fail2ban
Python 100.00%
fail2ban-bypass's Introduction
Fail2ban bypass using TOR
Fail2Ban reads log files from different services and if that contains an authorization failure, it report and bans the corresponding IP addresses using firewall rules. It updates firewall rules to reject the IP address. That means that if we send every request with a different IP Address that results in bypassing this firewall.
For the HTTP Bruteforcer we are using random TOR proxies per request using requests-session and that results in bypassing fail2ban. This script uses multiprocessing so we can have faster results.
For the FTP Bruteforcer we are using random tor proxies per request using proxychains and that results in bypassing fail2ban. This script uses multiprocessing so we can have faster results.
For the SSH Bruteforcer we are using random tor proxies per request using proxychains and that results in bypassing fail2ban. StrictHostKeyChecking=no is used to make our attempts without strict host key checking.