BFP

A Brute Force Protection System


Project maintained by JamesOwenHall Hosted on GitHub Pages — Theme by mattgraham

BFP is your first line of defence against brute force attacks with a focus on low resource usage and high concurrency. It’s open source and has simple APIs for several common languages.

How It Works

The core of the system is a lightweight application that tracks repeated requests for usernames, passwords and any other type of data that can be tracked in a request (such as the attacker’s IP address). You’re notified anytime you receive a request that appears to be an attack.

It’s important to note that BFP only tells you which requests look like attacks and not what to do about it. For more information on how to deal with brute force attacks, see here.

Installation

BFP is designed to be as flexible as possible by imposing as few requirements as possible. Unless you compile from source, there are no dependencies to run BFP.

Binaries

There are binaries available for download for 64-bit Linux, Mac OS X and Windows on the release page. For other operating systems or architectures, you’ll need to build from source.

From Source

To build BFP from source, you’ll need to have the Go compiler, as well as Git. Once you have those, run the following commands.

$ go get github.com/JamesOwenHall/BruteForceProtection/core
$ cd $GOPATH/src/github.com/JamesOwenHall/BruteForceProtection/core
$ go build -o bfp

Usage

See the wiki.