-
Updated
Dec 22, 2020 - Python
bruteforce
Here are 499 public repositories matching this topic...
-
Updated
Jan 1, 2021 - Python
-
Updated
Oct 9, 2020 - Python
I've read the docs, and it seems you can pass through knex instances, but I didn't see if it supports SQLite3 - could you clarify please?
-
Updated
Dec 25, 2020 - Python
-
Updated
Dec 18, 2020 - Python
The app fails when export-hashes CLI option is called and no export-hashes directory is present in binary directory. After spending few hours on processing pcaps this may be quite frustrating - app should create the directory or at least ask the user. Probably writing to OS default temp directory and then moving to per OS default location like current directory or $HOME/BruteShark/${date}/export-
-
Updated
Jul 2, 2020 - Shell
-
Updated
Dec 31, 2020 - Python
-
Updated
Nov 22, 2020
-
Updated
Dec 31, 2020 - Go
-
Updated
May 5, 2019 - Python
-
Updated
Dec 27, 2020 - Python
-
Updated
Dec 29, 2020 - C
-
Updated
Apr 5, 2020 - Python
-
Updated
Oct 25, 2020 - Python
-
Updated
Dec 31, 2020 - Shell
-
Updated
May 15, 2020 - Python
-
Updated
Oct 12, 2020 - JavaScript
-
Updated
Nov 19, 2020
-
Updated
Dec 28, 2020 - Go
-
Updated
Mar 21, 2020 - Perl
-
Updated
Apr 24, 2020 - Python
-
Updated
Nov 26, 2020 - CSS
-
Updated
Dec 15, 2020
-
Updated
Jun 25, 2020 - Python
Improve this page
Add a description, image, and links to the bruteforce topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the bruteforce topic, visit your repo's landing page and select "manage topics."
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p adminI see the following r