bruteforce-attacks
Here are 67 public repositories matching this topic...
-
Updated
Jul 2, 2020 - Shell
-
Updated
May 15, 2020 - Python
-
Updated
Mar 21, 2020 - Perl
-
Updated
Oct 14, 2019 - Python
-
Updated
Dec 2, 2020 - Python
-
Updated
Nov 25, 2020 - Shell
-
Updated
Oct 24, 2019 - Python
-
Updated
Nov 30, 2017 - Shell
-
Updated
Apr 16, 2020 - Python
-
Updated
Jun 28, 2018 - C#
-
Updated
Sep 9, 2020 - Python
-
Updated
Dec 19, 2019 - Perl
-
Updated
Mar 12, 2020 - Python
-
Updated
Jan 16, 2020 - Python
-
Updated
Nov 23, 2017 - Shell
-
Updated
Aug 19, 2018 - Python
-
Updated
Nov 7, 2020 - Python
-
Updated
Sep 18, 2019 - Visual Basic
-
Updated
Nov 3, 2020 - Python
-
Updated
Oct 19, 2020 - Python
-
Updated
Jul 3, 2018 - PowerShell
-
Updated
Sep 2, 2019 - Python
-
Updated
Oct 4, 2020 - Python
-
Updated
Dec 25, 2019 - Python
-
Updated
May 22, 2020 - Python
-
Updated
Apr 6, 2020 - PowerShell
-
Updated
Apr 8, 2020 - Python
-
Updated
Nov 21, 2017
Improve this page
Add a description, image, and links to the bruteforce-attacks topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the bruteforce-attacks topic, visit your repo's landing page and select "manage topics."


Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p adminI see the following r