thc-hydra
Password cracker
A tool to demonstrate how easily passwords can be cracked
hydra
10k stars
384 watching
2k forks
Language: C
last commit: over 1 year ago
Linked from 2 awesome lists
brute-forcebrute-force-attacksbrute-force-passwordsbruteforcebruteforce-attacksbruteforcerbruteforcinghydranetwork-securitypassword-crackerpassword-crackingpenetration-testingpentestpentest-toolpentestingthc
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A collection of tips and tricks for using Linux shell scripting and SSH techniques to gain access and manipulate systems remotely. | 3,175 |
| | A framework for configuring complex applications by providing a flexible and elegant way to manage configuration and setup of software systems. | 8,876 |
| | A tool that scans container images and file systems for sensitive data such as passwords and keys. | 3,146 |
| | A Zero Trust protocol that leverages resource-hiding and encryption to safeguard servers and data from attackers | 13,520 |
| | A C++ library for secure computations using homomorphic encryption | 3,647 |
| | A tool for automatically exploiting vulnerabilities to gain elevated privileges on Linux systems | 6,735 |
| | A tool for brute-forcing SSH public-key authentication to test penetration testing and ethical hacking scenarios. | 74 |
| | Exploits a locked computer to install a persistent backdoor and expose internal network resources. | 6,268 |
| | A software reverse engineering framework with disassembler and analysis tools | 52,492 |
| | A phishing tool designed to simulate and educate about online security threats | 11,646 |
| | A comprehensive guide to securing systems and applications by applying engineering principles to security | 9,972 |
| | A remote administration tool for controlling and managing remote operating systems | 2,390 |
| | A high-performance password recovery and hashing utility utilizing hardware acceleration | 21,542 |
| | An auditing tool for evaluating the security and configuration of SSH servers | 2,959 |
| | A honeypot designed to detect and analyze brute force SSH and Telnet attacks by emulating a Unix system or proxying remote connections. | 5,260 |