Skip to content
#

brute-force-attacks

Here are 126 public repositories matching this topic...

jhertz
jhertz commented Apr 17, 2020

Hi All,

So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:

hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p admin

I see the following r

EMAGNET

Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute forcing spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts

  • Updated May 25, 2020
  • Shell
codeling
codeling commented Jan 31, 2017

When entering a subnet or IP address for blocking, bfstop should make sure that it the entered string is in a format that represents a valid IP v4 or v6 address or subnet .

There should also be a possibility to add the administrator's own IP address to the whitelist with a single click.

In addition, for subnets it could be useful to show a hint on the subnet that is whitelisted, possibly in

Facebrute is an advance facebook Bruteforce script made in python language. Just provide username & wordlist and this script is going to try all passwords with returning responses as well. It uses python-requests with tor stem controller that changes its Public IP on every attempt as facebook block IP that try 20 attempts at once.

  • Updated May 2, 2020
  • Python

Improve this page

Add a description, image, and links to the brute-force-attacks topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the brute-force-attacks topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.