-
Updated
Oct 15, 2020 - Python
pentest
Here are 570 public repositories matching this topic...
-
Updated
Oct 15, 2020 - Python
-
Updated
Oct 6, 2020
-
Updated
Sep 27, 2020 - Shell
-
Updated
Oct 10, 2020
-
Updated
Sep 18, 2020 - PowerShell
-
Updated
Oct 1, 2020
-
Updated
Oct 6, 2020 - Ruby
-
Updated
Jul 19, 2020 - Shell
-
Updated
Jul 26, 2020 - Python
-
Updated
Aug 30, 2020
-
Updated
Sep 15, 2020 - C#
so if the password is correct it accepts it .... and if it's wrong it says the entered password is wrong .. and asks for the password again .. just like what the real sites do :)
-
Updated
Aug 19, 2020 - JavaScript
-
Updated
Oct 9, 2020 - Python
-
Updated
Sep 5, 2020 - Python
-
Updated
Jun 22, 2020 - C
-
Updated
Jun 20, 2020 - Ruby
-
Updated
Sep 7, 2020 - Python
-
Updated
Oct 15, 2020
-
Updated
Oct 6, 2020 - Python
-
Updated
Oct 14, 2020 - JavaScript
-
Updated
Jan 2, 2020 - Python
-
Updated
Jul 1, 2020 - Java
Improve this page
Add a description, image, and links to the pentest topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pentest topic, visit your repo's landing page and select "manage topics."
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p admin
I see the following r