Brutemap - Let's find someone's account...


Brutemap is an open source penetration testing tool that automates testing accounts to the site's login page, based on Dictionary Attack. With this, you no longer need to search for other bruteforce tools and you also no longer need to ask CMS What is this? (only to find parameter forms), because brutemap will do it automatically. Brutemap is also equipped with an attack method that makes it easy for you to do account checking or test forms with the SQL injection bypass authentication technique.


Brutemap uses selenium to interact with the website. So, you need to install Web Driver for selenium first. See here. If you have installed the git package, you only need to clone the repository Git. Like this:

$ git clone

And, install the required modules:

$ pip install -r requirements.txt


For basic use:

$ python -t -u admin -p abc, root, default

To display a list of available options:

$ python -h

For more information about available options, you can visit the User's manual.

Attack method

On the brutemap tool, there are several attack methods that make it easy for you to check accounts or test forms.


The Twin Method is a method that tests passwords based on the current username index. And the purpose of this method is to simplify checking accounts

For example, I have 2 usernames:


And, 1 password:


And it will come out, like this:

=> admin : default

The root username will not be tested, because it has no partner password.

Use the option --twin to activate this method

SQL Injection Bypass Authentication

This method will test the page form with SQL injection payloads, for more information see here

Use the option (-sB or --sqli-bypass) to activate this method.

SQL Injection Payloads

This method is the same as the SQL Injection Bypass Authentication method, but it will insert SQL injection payloads into the username.

For example, I have 2 usernames:


And, 2 payloads:

') or true--
')) or 1--

And it will come out, like this:

=> admin') or true-- : ...
=> admin')) or 1--   : ...

Use the option (-sP or --sqli-payloads) to activate this method


Before contributing to this project, please read the contributing guidelines.


We hope you are happy and we hope you donate! Please donate today to: (thanks!)


July 9, 2020
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023