Some notes about Hydra for bruteforcing
☆189Mar 11, 2020Updated 5 years ago
Alternatives and similar repositories for hydra_notes
Users that are interested in hydra_notes are comparing it to the libraries listed below
Sorting:
- POC for CVE-2020-13151☆38Aug 3, 2020Updated 5 years ago
- My OSCP cheat sheet☆22Aug 4, 2024Updated last year
- Subdomain finder☆10Mar 13, 2025Updated 11 months ago
- ☆33Jul 20, 2021Updated 4 years ago
- Prototype Pollution exploits collection☆37Aug 8, 2021Updated 4 years ago
- ☆1,157Apr 21, 2021Updated 4 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,268Feb 20, 2026Updated 2 weeks ago
- 107逢甲-安全程式設計-教材與CTF題目☆12Nov 2, 2019Updated 6 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- Hydra Password Cracking Cheetsheet☆417Oct 7, 2020Updated 5 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,255Aug 20, 2024Updated last year
- ☆221Jul 20, 2020Updated 5 years ago
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 3 years ago
- Reference of Vehicle Security。☆13Aug 13, 2021Updated 4 years ago
- CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)☆10Apr 8, 2022Updated 3 years ago
- It's a CLI Unity DLL Injector.☆12Aug 8, 2019Updated 6 years ago
- CVE-2024-0044☆12Aug 24, 2024Updated last year
- Werkzeug password cracker☆18Nov 14, 2024Updated last year
- POC for CVE-2024-23897 Jenkins File-Read☆38Nov 20, 2025Updated 3 months ago
- Compiled Binaries for Ghostpack☆1,608Oct 24, 2024Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,325Feb 15, 2026Updated 2 weeks ago
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.☆13Apr 26, 2023Updated 2 years ago
- About PIVOting☆13Dec 19, 2023Updated 2 years ago
- 🎮 AI-powered solo mode for Backdoors & Breaches. Train incident response skills anytime with an LLM Incident Master. Arcade-themed fork …☆28Dec 27, 2025Updated 2 months ago
- TLS protocol scanner☆15Sep 27, 2022Updated 3 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- Powershell tool to automate Active Directory enumeration.☆1,284Sep 9, 2025Updated 5 months ago
- ☆16Nov 27, 2022Updated 3 years ago
- Support files for my book "Learn Cisco Network Administration in a Month of Lunches" from Manning Publications☆14Aug 15, 2017Updated 8 years ago
- A reverse shell wrapper for tor servers. Get a shell over tor via socat.☆13Dec 10, 2015Updated 10 years ago
- ☆11Feb 5, 2020Updated 6 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- ☆61Jan 4, 2022Updated 4 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆293Jan 1, 2022Updated 4 years ago
- SSTI Payload Generator☆93Aug 8, 2022Updated 3 years ago
- python spraying tools based on impacket lib☆55Sep 6, 2022Updated 3 years ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.☆16Aug 19, 2021Updated 4 years ago