-
Updated
Oct 4, 2020
penetration-testing
Here are 803 public repositories matching this topic...
-
Updated
Oct 8, 2020 - Python
-
Updated
Oct 1, 2020
-
Updated
Oct 7, 2020 - Python
-
Updated
Oct 5, 2020
-
Updated
Oct 7, 2020 - Python
-
Updated
Oct 6, 2020 - PowerShell
-
Updated
Oct 6, 2020
-
Updated
Oct 3, 2020 - PowerShell
-
Updated
Oct 7, 2020 - Python
-
Updated
Sep 28, 2020
-
Updated
Oct 1, 2020
-
Updated
Oct 4, 2020
-
Updated
Jan 28, 2020 - Ruby
-
Updated
Sep 10, 2020 - JavaScript
-
Updated
Jul 10, 2019
-
Updated
Oct 6, 2020 - Ruby
-
Updated
Oct 8, 2020 - Python
-
Updated
Sep 6, 2020
-
Updated
Sep 30, 2020
-
Updated
Sep 19, 2020 - Shell
Would be awesome if it would be possible to save the found streams to a M3U file, compatible with VLC. An example template of a valid M3U file is the following:
#EXTM3U
#EXTINF:-1 tvg-id="" tvg-name="" tvg-language="" tvg-logo="" tvg-country="" tvg-url="" group-title="",[IP AND CHANNELID HERE FOR NAME]
rtsp://192.168.0.5/route/to/stream/here
#EXTINF:-1 tvg-id="" tvg-name="" tvg-langua
-
Updated
Sep 28, 2020 - PowerShell
-
Updated
Aug 30, 2020
-
Updated
Oct 6, 2020 - Shell
-
Updated
Aug 7, 2020
-
Updated
May 22, 2020 - Lua
-
Updated
Sep 30, 2020 - Python
-
Updated
Aug 19, 2019 - Python
Improve this page
Add a description, image, and links to the penetration-testing topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the penetration-testing topic, visit your repo's landing page and select "manage topics."
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p adminI see the following r