-
Updated
Nov 11, 2019
password-cracking
Here are 62 public repositories matching this topic...
-
Updated
Sep 30, 2018 - Python
-
Updated
Mar 13, 2019 - CSS
-
Updated
Jul 15, 2019 - Python
-
Updated
Oct 16, 2020 - Jupyter Notebook
You should order masks by efficiency (occurrences/key_space
) because this will lead to the less guesses to crack passwords.
Looking at the top 5:
https://github.com/kaonashi-passwords/Kaonashi/blob/5239bd333ed34993b43126a4499606ba70086034/masks/kaonashi_masks_numbered.txt#L1-L5
And ordering just the 1000 in kaonashi_masks_numbered.txt by efficiency the top 5 are now:
673407:?u?u?u?u
-
Updated
Oct 29, 2020 - C
-
Updated
Jul 11, 2019 - C
-
Updated
Nov 17, 2020 - Python
-
Updated
Oct 14, 2019 - Python
-
Updated
Oct 8, 2020 - Python
-
Updated
Apr 18, 2020
-
Updated
Oct 20, 2018 - JavaScript
-
Updated
Jul 11, 2019 - Python
-
Updated
Oct 27, 2020 - Python
-
Updated
Sep 28, 2017 - Shell
-
Updated
Aug 18, 2018 - Shell
-
Updated
Jun 10, 2020 - Shell
-
Updated
May 6, 2018 - Python
-
Updated
May 11, 2018
-
Updated
Jul 15, 2020 - Python
-
Updated
Dec 6, 2019 - Red
-
Updated
Nov 15, 2020 - Shell
-
Updated
Nov 6, 2020
-
Updated
Nov 22, 2020 - Python
-
Updated
Nov 13, 2020 - Python
-
Updated
Jan 31, 2020
-
Updated
Nov 6, 2019
Improve this page
Add a description, image, and links to the password-cracking topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the password-cracking topic, visit your repo's landing page and select "manage topics."
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p admin
I see the following r