-
Updated
Nov 29, 2020 - Python
pentest
Here are 592 public repositories matching this topic...
-
Updated
Oct 19, 2020
-
Updated
Nov 26, 2020 - Shell
-
Updated
Oct 17, 2020
-
Updated
Nov 24, 2020 - PowerShell
-
Updated
Oct 1, 2020
-
Updated
Nov 25, 2020 - Ruby
-
Updated
Jul 19, 2020 - Shell
-
Updated
Nov 29, 2020 - Python
-
Updated
Aug 30, 2020
-
Updated
Nov 24, 2020 - C#
so if the password is correct it accepts it .... and if it's wrong it says the entered password is wrong .. and asks for the password again .. just like what the real sites do :)
-
Updated
Aug 19, 2020 - JavaScript
-
Updated
Sep 5, 2020 - Python
-
Updated
Jun 22, 2020 - C
-
Updated
Jun 20, 2020 - Ruby
-
Updated
Nov 23, 2020 - Python
-
Updated
Nov 28, 2020
-
Updated
Oct 6, 2020 - Python
-
Updated
Nov 24, 2020 - JavaScript
-
Updated
Jul 1, 2020 - Java
-
Updated
Oct 30, 2020 - Python
-
Updated
Nov 23, 2020
-
Updated
Jan 2, 2020 - Python
Improve this page
Add a description, image, and links to the pentest topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pentest topic, visit your repo's landing page and select "manage topics."
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p admin
I see the following r