04-18-2017, 01:59 AM
Honestly, I read the docs for both tools and I am not convinced. One is basicly closed source, the other is not quite up to date and looks very unefficient. I might just try to separate bruteforce attacks myself. Must be some way to implement it with rules and whatnot. Other then that, I'm going to take a look at your tool.
Thanks.
Thanks.