Skip to content
#

penetration-testing

Here are 692 public repositories matching this topic...

This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

  • Updated May 22, 2020
  • Python
jhertz
jhertz commented Apr 17, 2020

Hi All,

So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:

hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p admin

I see the following r

monkey
VakarisZ
VakarisZ commented Mar 30, 2020

Exploiter selector should have these additional features:

  • Filter by type. There should be keywords/buttons like "brute force", "vulnerability", "unsafe", "all" that would enable/disable corresponding exploiters.
  • Exploiter description. Upon clicking on exploiter user should see a short description of with with CVE if it has one.

This feature should be an extension of [list selection reac

A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.

  • Updated Apr 9, 2020
  • Python

Improve this page

Add a description, image, and links to the penetration-testing topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the penetration-testing topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.