Hydra gui для windows

Hydra-GUI

Hydra-GUI White Hat Edition

« Hydra-GUI » is a graphical user interface for the windows version of « THC Hydra ».

[!] Important: GUI limited to: FTP/RDP/HTTP Auth and HTTP form attacks as i don’t needed SSH and all the rest of Hydra features.

Tip: Default path for Hydra: C:\hydra — Default path for wordlist: C:\hydra\pwd.lst

Why?

Wasn’t mean to be public at first but i’m releasing this code since i’ve switched to Patator made my new GUI and don’t use anymore Hydra.

Botnets pre-made forms:

(version 0.2)

  • Citadel/Zeus/IceIX/KINS
  • Pony 1.9
  • Sakura exploit kit
  • Bleedinglife v2 reloaded
  • BlackEnergy
  • Blackshades Bot
  • Barracuda Loader
  • Eleonore Exploits pack version 1.4.4mod
  • Cool Exploit Kit
  • Blackhole v1.2.3
  • Nuclear exploit pack
  • Multi Locker 3
  • CCGRAB Panel V.1.0
  • WSO Shell
  • VertexNet Loader
  • 29A Loader
  • iBanking
  • Tinba
  • Kovter
  • Solar
  • Gorynych/DiamondFox v4.2.0.380
  • Kraken HTTP
  • H1N1 Loader
  • Alina

Where can i download Hydra ?

A compiled version can be found here otherwise just compile it from source with cygwin, may only the challenge guide you ;)

Contact

xylitol☆temari.fr — xylitol☆malwareint.com

THC Hydra — утилита для UNIX-терминала, предназначенная для тестирования безопасности серверов, локальных сетей, веб-приложений. Имеет открытый исходный код, легко компилируется практически под любые актуальные операционные системы. То есть существует также THC Hydra для Windows, Mac OS, Android. Программа включена в базовую сборку Kali Linux. Установка в Kali NetHunter тоже возможна (без GUI).

Возможности программы

Утилита поддерживает проведение взлома через брутфорс (не по хэшу, а именно перебором ключей по словарю). Главное же её преимущество — это поддерживаемые сетевые протоколы. Их более 50, включая Rlogin, RSH, Subversion и даже XMPP. И программа может работать в параллельном режиме, выполняя взлом сразу с нескольких компьютеров (в том числе с задействованием GPU-вычислений) или по нескольким сетевым протоколам одновременно.

Основные возможности приложения:

  • доступ к защищенным локальным сетям (как через Ethernet, так и WiFi);
  • доступ к LAN по заданному диапазону портов;
  • восстановление пароля к зашифрованным файлам/пакетам;
  • взлом веб-серверов;
  • взлом почтовых сервисов (включая Gmail, с возможностью обхода ограничений по капче);
  • составление собственного словаря на основе заданной ключевой фразы.

Также THC Hydra Linux может дистанционно взламывать специфические локальные сети (в которых установлены только игровые консоли или торговые автоматы с дистанционным управлением). Утилита работает через терминал, но для неё выпустили массу неофициальных GUI (самый популярный Xhydra).

Результаты брутфорса можно экспортировать в log-файл. Это позволит выполнить взлом сети в несколько попыток (начинать всё сначала каждый раз не потребуется).

Варианты использования программы

С помощью Hydra можно восстановить забытый пароль к файлу или WiFi. Она работает заметно быстрее других приложений для брутфорса, может задействовать одновременно вычисления как на CPU, так и GPU (обязательно требуется установка проприетарного драйвера последней версии).

Скачать THC Hydra актуальной версии бесплатно можно на нашем сайте.

Cyberly strives to stay free, and we rely on donations to make it possible. If our content has helped you, please consider donating—your contribution helps keep the site running and allows us to keep creating valuable content.

Your support will help keep this knowledge free and accessible to everyone, now and in the future.

Donate Now

Reading Time: 3 minutes

Welcome to Cyberly’s Hydra download page. Hydra, also known as THC-Hydra, is a powerful and versatile tool designed for ethical hacking, penetration testing, and security auditing. It is widely respected in the cybersecurity community for its ability to perform fast and efficient brute force attacks on a variety of protocols and authentication systems. By downloading Hydra, you gain access to a cutting-edge tool that helps identify weak credentials and vulnerabilities, enabling you to secure your systems and networks more effectively.

What is Hydra?

Hydra is an open-source application developed to test login and password security. It supports numerous protocols such as HTTP, HTTPS, SSH, FTP, SMTP, IMAP, POP3, and many more, making it a highly adaptable solution for testing various environments. Its compatibility with diverse authentication mechanisms ensures that you can assess vulnerabilities in web applications, remote services, and network systems alike. With Hydra, ethical hackers can simulate real-world attack scenarios to identify and address potential entry points before malicious actors exploit them.

Features of Hydra

Hydra is packed with features that make it an essential tool for ethical hackers and cybersecurity professionals:

  • Protocol Versatility: Supports dozens of protocols, including widely used ones like SSH, RDP, MySQL, and LDAP.
  • High-Speed Performance: Employs parallelised connections to perform fast and efficient brute force attacks.
  • Customisable Modules: Hydra‘s modular architecture allows users to add custom attack modules for specific use cases.
  • Command-Line Interface: Offers advanced users full control over attacks through a straightforward CLI.
  • Dictionary and Brute Force Attacks: Supports both dictionary-based and iterative brute force password-cracking techniques.
  • Open-Source and Free: Available under the GNU General Public License, Hydra remains accessible to everyone in the ethical hacking community.

Why Use Hydra?

Hydra is designed to expose weak authentication systems by demonstrating the risks associated with poor password hygiene and inadequate security configurations. It helps organisations strengthen their defences by identifying accounts vulnerable to brute force attacks and improving their authentication mechanisms.

For businesses and individuals, Hydra is a wake-up call to adopt best practices, such as enforcing complex password policies, implementing multi-factor authentication (MFA), and continuously monitoring login attempts to detect suspicious activity.

How to Download Hydra

Hydra is an open-source tool available for free download. Follow these simple steps to obtain the latest version of Hydra:

  1. Visit the official GitHub repository for THC-Hydra: https://github.com/vanhauser-thc/thc-hydra.
  2. Download the source code or pre-compiled binaries for your operating system.
  3. Follow the installation instructions provided in the README file to set up Hydra on your system.

Hydra supports multiple operating systems, including Linux, macOS, and Windows, ensuring compatibility with most testing environments.

Important Note

Hydra is a tool intended for ethical hacking and cybersecurity purposes only. Its use is strictly prohibited on systems or networks where you do not have explicit permission to perform security testing. Misuse of Hydra may result in legal consequences. Always adhere to ethical guidelines and legal frameworks when using this tool.

Getting Started with Hydra

Once you have downloaded and installed Hydra, you can begin using it to conduct password security assessments. Familiarise yourself with its command-line options and experiment with different protocols to understand its capabilities. Cyberly recommends using Hydra alongside other penetration testing tools for a comprehensive evaluation of your system’s security.

Support and Resources

If you have any questions about Hydra or need assistance, explore the following resources:

  • Documentation: The official GitHub page provides detailed documentation, including examples and usage guides.
  • Forums: Join cybersecurity forums and communities to discuss Hydra with other professionals.
  • Cyberly Tutorials: Stay tuned to Cyberly for in-depth guides and tutorials on using Hydra effectively.

Conclusion

Hydra is a cornerstone application for anyone serious about ethical hacking and cybersecurity. By identifying and addressing vulnerabilities in authentication systems, it empowers users to build more secure digital environments. Download Hydra today and take the first step towards safeguarding your systems against potential threats.

Download Hydra Now: https://github.com/vanhauser-thc/thc-hydra

Take control of your system’s security with Hydra and Cyberly! Together, we can make the digital world a safer place.

Disclaimer: This post may contain affiliate links. If you make a purchase through one of these links, Cyberly may earn a small commission at no extra cost to you. Your support helps us continue providing free tutorials and content. Thank you!

This is the Windows app named thc-hydra whose latest release can be downloaded as hydrav9.2.zip. It can be run online in the free hosting provider OnWorks for workstations.

Download and run online this app named thc-hydra with OnWorks for free.

Follow these instructions in order to run this app:

— 1. Downloaded this application in your PC.

— 2. Enter in our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.

— 3. Upload this application in such filemanager.

— 4. Start any OS OnWorks online emulator from this website, but better Windows online emulator.

— 5. From the OnWorks Windows OS you have just started, goto our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.

— 6. Download the application and install it.

— 7. Download Wine from your Linux distributions software repositories. Once installed, you can then double-click the app to run them with Wine. You can also try PlayOnLinux, a fancy interface over Wine that will help you install popular Windows programs and games.

Wine is a way to run Windows software on Linux, but with no Windows required. Wine is an open-source Windows compatibility layer that can run Windows programs directly on any Linux desktop. Essentially, Wine is trying to re-implement enough of Windows from scratch so that it can run all those Windows applications without actually needing Windows.

SCREENSHOTS

thc-hydra

DESCRIPTION

Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already several login hacker tools available, however, none does either support more than one protocol to attack or support parallelized connects. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD/OpenBSD, QNX (Blackberry 10) and MacOS. However the module engine for new services is very easy so it won’t take a long time until even more services are supported. Via the command line options you specify which logins to try, which passwords, if SSL should be used, how many parallel tasks to use for attacking, etc. PROTOCOL is the protocol you want to use for attacking, e.g. ftp, smtp, http-get or many others are available.

Features

  • For researchers and security consultants
  • This tool is for legal purposes only
  • It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD/OpenBSD, QNX (Blackberry 10) and MacOS.
  • Currently this tool supports several protocols
  • If you want the ssh module, you have to setup libssh (not libssh2!) on your system
  • Supports mobile systems based on Linux, MacOS or QNX

Programming Language

C

This is an application that can also be fetched from https://sourceforge.net/projects/thc-hydra.mirror/. It has been hosted in OnWorks in order to be run online in an easiest way from one of our free Operative Systems.

Download Windows & Linux apps

  • Linux apps
  • Windows apps
  • 1

    OfficeFloor
    OfficeFloor provides inversion of
    coupling control, with its: — dependency
    injection — continuation injection —
    thread injection For more information
    visit the…
    Download OfficeFloor
  • 2

    DivKit
    DivKit is an open source Server-Driven
    UI (SDUI) framework. It allows you to
    roll out server-sourced updates to
    different app versions. Also, it can be
    used fo…
    Download DivKit
  • 3

    subconverter
    Utility to convert between various
    subscription format. Shadowrocket users
    should use ss, ssr or v2ray as target.
    You can add &remark= to
    Telegram-liked HT…
    Download subconverter
  • 4

    SWASH
    SWASH is a general-purpose numerical
    tool for simulating unsteady,
    non-hydrostatic, free-surface,
    rotational flow and transport phenomena
    in coastal waters as …
    Download SWASH
  • 5

    VBA-M (Archived — Now on Github)
    Project has moved to
    https://github.com/visualboyadvance-m/visualboyadvance-m
    Features:Cheat creationsave statesmulti
    system, supports gba, gbc, gb, sgb,
    sgb2Tu…
    Download VBA-M (Archived — Now on Github)
  • 6

    Stacer
    Linux System Optimizer and Monitoring
    Github Repository:
    https://github.com/oguzhaninan/Stacer.
    Audience: End Users/Desktop. User
    interface: Qt. Programming La…
    Download Stacer
  • More »

Linux commands

  • 1

    aainfo
    aafire, aainfo, aasavefont, aatest —
    aalib example programs …
    Run aainfo
  • 2

    aajm
    aajm — ascii art jugglemaster …
    Run aajm
  • 3

    coolmail
    coolmail — 3D animated mail notificaion
    utility …
    Run coolmail
  • 4

    coop-computing-tools
    coop-computing-tools — share resources
    in a heterogeneous, and unreliable
    computing environment DESCRIPTION: The
    Cooperative Computing Tools (cctools)
    are a co…
    Run coop-computing-tools
  • 5

    garmin_save_runs
    garmin_save_runs — retrieve track logs
    from a Forerunner device. …
    Run garmin_save_runs
  • 6

    garniere
    garnier — Predicts protein secondary
    structure using GOR method …
    Run garniere
  • More »

THC-Hydra Windows Install Guide



Ok So I had a difficult time as a beginner installing hydra so I’ll be helping
you today installing THC-Hydra in this Tutorial.

Step 1: Download the Cygwin that corresponds to your system.

DOWNLOAD

Note: you can find out if your system is either 64 or
32 bit by right clicking «Computer» in the start menu.


Step 2: Install Cygwin by clicking on your what you’ve downloaded from the
Cygwin website. Press next on everything until when asked for what server to
download from, click on anyone (I don’t think it matters which one you choose).
Stop again when you need to select packages and move to step 3.


Step 3: Press the + button besides the «Default» package (only
package that should be there) and a list of packages should show up; find the
package «devel» under the «Default» package and change
where it says «default» besides each package’s name to
«Install» only to the devel package by clicking on where it says
«default» besides devel.


Note: The «default» package I talk about sitting at the top is
not the same as the «default» installation besides each package
.


Step 4: Click next, select the required packages option, go on and finish your
download


Step 5: Not really a step but you should have a Cygwin terminal on your desktop
and if not go to the install destination (usually «C:\Cygwin» or
«C:\Program Files\Cygwin») and right click the batch file labeled
Cygwin and press «Create Shortcut» and move the shortcut into
wherever you find the most convenient to have it at.

Note: You will be using the Cygwin terminal every time you want to use
hydra.

IMPORTANT, ONLY FOR 64-BIT USERS:

1. Go into the folder where Cygwin was installed


2. Go into the folder inside the Cygwin installation folder named
«bin»


3. Right Click on a file in «bin», Go to properties and copy the
location (Ex. C:\Program Files\Cygwin\bin) which is essentially the location of
the bin folder.


4. Go to «Control Panel\System and Security\System»


5. Click Advanced System Setting located to your left


6. Sitting at the bottom right of the screen that just popped up press the
Environment Variables button


7. On the second box of text titled System Variables scroll down until you find
the variable «Path»


8. Click the variable «Path» and click the edit button


9. Don’t mess with anything in the text box just type this besides all the
already written shit in the text box «;[Bin location Here]»


10. Press Ok


Now that we have finished installing Cygwin we can get to the fun part and
install Hydra


Step 1: Download Hydra from either directly

DOWNLOAD

Step 2: Unzip the file using a program such as Winrar (can be downloaded at www.rarlab.com) to your desktop.


Step 3: Move the file from your desktop into your main drive «C:»


Step 4: Open the Cygwin terminal which if you listened to me you made a
shortcut to already.


Error Note: If it says «cannot find mintty would you like to browse for
it» then browse to your installation folder, go to bin and look
alphabetically for mintty until you find it.


Step 5: search for cmd at the start menu (if you can’t it’s placed in «C:\Windows\System32\cmd»)
when you do find it right click it and click «run as administrator»


Step 6: type «NetSh Advfirewall set allprofiles state off» to turn
off your firewall off. manually turn off your other antiviruses such as Norton
or McAfee

Note: I understand this might sound crazy but when you’re installing a
hacking software you don’t anti-hack softwares running.

Now you can test Cygwin out by issuing a few commands that you wouldn’t normally have use to in Windows that are common Linux commands. Here is a quick view of: «pwd», «cd /», «ls», «ps»:




Step 7: on Cygwin terminal type 


«cd /cygdrive/c/hydra-8.1.tar»



Once this is successful there should be yellow text besides your user name
saying «/cygdrive/c/hydra-8.1.tar»



Step 8: Type «./configure»


wait until it stops saying anything and then wait 2/3 minutes to make sure it
stopped.



step 9: Type «make»


wait until it stops saying anything and then wait 2/3 minutes to make sure it
stopped.


Step 10: Type «make install»


wait until it stops saying anything and then wait 2/3 minutes to make sure it
stopped.


Step 11: I hope by now everything has gone fine and Cygwin should be letting
you input but just close it if you’re done.


Step 12: Now right click your Cygwin shortcut, go into properties and make the
start in «C:\hydra-8.1.tar» and rename it hydra


Step 13: Turn your firewall back on by typing this in the admin cmd «NetSh
Advfirewall set allrprofiles state on» but make sure that it doesnt
intervene with hydra, google how to exclude programs from firewall and if you
have a antivirus same goes.

Понравилась статья? Поделить с друзьями:
0 0 голоса
Рейтинг статьи
Подписаться
Уведомить о
guest

0 комментариев
Старые
Новые Популярные
Межтекстовые Отзывы
Посмотреть все комментарии
  • Hp laserjet 1000 series драйвер windows 7 x32
  • Как установить windows 11 на неподдерживаемый ноутбук
  • Windows server backup это
  • Как восстановить автозагрузку в windows 10
  • Переключение между экранами windows 10 горячие клавиши