-
Updated
Nov 30, 2020 - Python
bruteforce
Here are 472 public repositories matching this topic...
-
Updated
Dec 6, 2020 - Python
-
Updated
Oct 9, 2020 - Python
I've read the docs, and it seems you can pass through knex instances, but I didn't see if it supports SQLite3 - could you clarify please?
-
Updated
Oct 17, 2020 - Python
-
Updated
Oct 30, 2020 - Python
-
Updated
Dec 2, 2020 - C#
-
Updated
Jul 2, 2020 - Shell
-
Updated
Dec 4, 2020 - Python
-
Updated
Nov 22, 2020
-
Updated
May 5, 2019 - Python
-
Updated
May 9, 2020 - Python
-
Updated
Dec 6, 2020 - C
-
Updated
Apr 5, 2020 - Python
-
Updated
Oct 25, 2020 - Python
-
Updated
Nov 23, 2020
-
Updated
May 15, 2020 - Python
-
Updated
Oct 12, 2020 - JavaScript
-
Updated
Nov 19, 2020
-
Updated
Mar 21, 2020 - Perl
-
Updated
Apr 24, 2020 - Python
-
Updated
Nov 30, 2020
-
Updated
Nov 26, 2020 - CSS
-
Updated
Jun 25, 2020 - Python
-
Updated
Nov 21, 2020 - Go
-
Updated
Nov 19, 2020 - Python
Improve this page
Add a description, image, and links to the bruteforce topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the bruteforce topic, visit your repo's landing page and select "manage topics."


Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p adminI see the following r