pentest-tool
Here are 326 public repositories matching this topic...
-
Updated
Jun 11, 2020 - Python
-
Updated
Jul 8, 2020 - Shell
-
Updated
Jul 10, 2020 - Python
-
Updated
Mar 5, 2020 - Python
-
Updated
Feb 5, 2020 - JavaScript
-
Updated
Oct 18, 2019 - Python
-
Updated
May 25, 2020 - Python
-
Updated
Dec 7, 2019 - Objective-C
-
Updated
Apr 23, 2020 - Python
-
Updated
May 27, 2020 - Python
I have been using this tool for awhile and i noticed 50% of the results are false positive. for i,e after cloudflair dump a list of ip addresses for the site origin server it can't detect which one is working so i after i take those ip addresses i test them manually on the both ports 443 & 80 some they work on 443 port and some they only work at 80 port.
Thank you so much for this amazing tool
-
Updated
Jun 21, 2020 - Python
-
Updated
Dec 23, 2018 - Python
-
Updated
Oct 14, 2019 - Go
-
Updated
Dec 11, 2019 - HTML
-
Updated
Oct 3, 2018 - Python
-
Updated
Jun 29, 2020 - Python
-
Updated
May 10, 2020 - JavaScript
-
Updated
Jun 27, 2020 - Shell
-
Updated
May 27, 2020 - Python
-
Updated
Jul 10, 2020 - PowerShell
-
Updated
Apr 25, 2019 - Python
-
Updated
Jul 10, 2020 - Go
-
Updated
Jul 30, 2018 - Python
-
Updated
Mar 25, 2020 - Python
ERR qdisc root handle could not be created. maybe flush network settings (--flush).
Raspberry pi 3 with kali.
I did the --flush but still same error
-
Updated
May 17, 2020 - Python
-
Updated
Apr 30, 2020 - PowerShell
-
Updated
Apr 20, 2018 - Python
Improve this page
Add a description, image, and links to the pentest-tool topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pentest-tool topic, visit your repo's landing page and select "manage topics."
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p admin
I see the following r