Stack Explorer

Hydra

Offensive cracker Open Source

Credential brute force tool

Official site

Platforms:

linux windows macos

Prerequisites:

networking authentication

Pros and Cons

Ventajas

  • + Support for 50+ protocols
  • + Very fast and efficient
  • + Configurable parallelization
  • + Open-source
  • + Well documented

Desventajas

  • - Can be easily blocked
  • - Improper use is illegal
  • - Generates a lot of traffic

Casos de Uso

  • Password auditing
  • Pentesting
  • Security assessments

Related Technologies