bruteforcing
Here are 27 public repositories matching this topic...
-
Updated
Jul 2, 2020 - Shell
-
Updated
Nov 24, 2020 - Shell
-
Updated
Apr 15, 2020 - Python
-
Updated
May 15, 2020 - Python
-
Updated
Mar 21, 2020 - Perl
-
Updated
Feb 15, 2020 - Python
-
Updated
Sep 9, 2020 - Python
-
Updated
Aug 14, 2018 - Python
-
Updated
May 2, 2020 - Python
-
Updated
Sep 2, 2019 - Python
-
Updated
Oct 4, 2020 - Python
-
Updated
Nov 17, 2018 - Perl
-
Updated
Jul 29, 2020 - Python
-
Updated
Feb 11, 2018 - Shell
-
Updated
Oct 28, 2017 - Go
-
Updated
Apr 20, 2020 - Go
-
Updated
Feb 6, 2020 - HTML
-
Updated
Oct 27, 2020 - Python
-
Updated
Mar 5, 2019 - C#
-
Updated
Aug 4, 2019 - Shell
-
Updated
Apr 4, 2020 - Python
-
Updated
Sep 6, 2017 - Python
-
Updated
Sep 6, 2017 - PHP
Improve this page
Add a description, image, and links to the bruteforcing topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the bruteforcing topic, visit your repo's landing page and select "manage topics."
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p admin
I see the following r