-
Updated
Nov 3, 2020 - Python
pentest
Here are 585 public repositories matching this topic...
-
Updated
Nov 5, 2020 - Python
-
Updated
Oct 19, 2020
-
Updated
Oct 21, 2020 - Shell
-
Updated
Oct 17, 2020
-
Updated
Nov 4, 2020 - PowerShell
-
Updated
Oct 1, 2020
-
Updated
Nov 4, 2020 - Ruby
-
Updated
Jul 19, 2020 - Shell
-
Updated
Jul 26, 2020 - Python
-
Updated
Aug 30, 2020
-
Updated
Nov 4, 2020 - C#
so if the password is correct it accepts it .... and if it's wrong it says the entered password is wrong .. and asks for the password again .. just like what the real sites do :)
-
Updated
Aug 19, 2020 - JavaScript
-
Updated
Oct 9, 2020 - Python
-
Updated
Sep 5, 2020 - Python
-
Updated
Jun 22, 2020 - C
-
Updated
Jun 20, 2020 - Ruby
-
Updated
Sep 7, 2020 - Python
-
Updated
Nov 2, 2020
-
Updated
Oct 6, 2020 - Python
-
Updated
Nov 3, 2020 - JavaScript
-
Updated
Oct 30, 2020 - Python
-
Updated
Jan 2, 2020 - Python
Improve this page
Add a description, image, and links to the pentest topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pentest topic, visit your repo's landing page and select "manage topics."
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p admin
I see the following r