password-cracker
Here are 153 public repositories matching this topic...
-
Updated
Oct 9, 2020 - Python
-
Updated
Sep 16, 2020 - C
-
Updated
Oct 20, 2020 - Python
-
Updated
Sep 21, 2020 - C
-
Updated
Oct 16, 2020 - Jupyter Notebook
-
Updated
Mar 19, 2020 - Python
-
Updated
Jul 11, 2019 - C
-
Updated
Mar 27, 2020 - Rust
-
Updated
Jul 1, 2019 - HTML
-
Updated
Jul 11, 2019 - Python
-
Updated
Aug 12, 2020 - Perl
-
Updated
Aug 28, 2020 - Python
-
Updated
Dec 28, 2017 - C++
-
Updated
Jul 8, 2020 - JavaScript
-
Updated
Apr 14, 2019 - C++
-
Updated
Dec 6, 2017 - Perl
-
Updated
Sep 8, 2020 - JavaScript
-
Updated
Jan 14, 2020
-
Updated
Jul 16, 2020 - JavaScript
-
Updated
Jan 16, 2018 - Python
-
Updated
Mar 14, 2019
-
Updated
Dec 3, 2018 - Python
-
Updated
Aug 21, 2014 - C
-
Updated
Aug 6, 2017 - C++
-
Updated
Apr 27, 2020 - Python
-
Updated
Jul 25, 2019 - Python
-
Updated
Jun 17, 2020 - Shell
Improve this page
Add a description, image, and links to the password-cracker topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the password-cracker topic, visit your repo's landing page and select "manage topics."
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p admin
I see the following r