• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

THC Hydra Download – Fast & Flexible Network Login Hacking Tool

February 14, 2007

Views: 504,901

THC Hydra Download below, this software rocks, it’s pretty much the most up to date and currently developed password brute forcing tool around at the moment.

THC Hydra Download - Fast & Flexible Network Login Hacking Tool

Number one problem with security and people getting hacked are passwords, as every password security study shows. Hydra is a parallelized login cracker which supports numerous protocols to attack. New modules are easy to add, besides that, it is flexible and very fast.

It supports a LOT of services and protocols too.

THC Hydra Hacking Tool Features

There are already several login hacker tools available, however, none does either support more than one protocol to attack or support parallelized connects.

Currently, this tool supports:

  • TELNET
  • FTP
  • HTTP-GET
  • HTTP-HEAD
  • HTTPS-GET
  • HTTP-HEAD
  • HTTP-PROXY
  • LDAP2
  • LADP3
  • SMB
  • SMBNT
  • MS-SQL
  • MYSQL
  • POSTGRES
  • REXEC
  • SOCKS5
  • VNC
  • POP3
  • IMAP
  • NNTP
  • PCNFS
  • ICQ
  • SAP/R3
  • Cisco auth
  • Cisco enable
  • SMTP-AUTH
  • SSH2
  • SNMP
  • CVS
  • Cisco AAA

However, the module engine for new services is very easy so it won’t take a long time until even more services are supported. Planned are: SSH v1, Oracle and more…

This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system.

Download THC Hydra

You can THC Hydra download is here:

thc-hydra-8.6.zip

How to install THC Hydra

Compile and install (./configure; make; make install)

If you want the THC Hydra windows hydra.exe version you can grab the Cygwin version from thc.org.

More info is available here

Related Posts:

  • An Introduction To Web Application Security Systems
  • nbtscan Download - NetBIOS Scanner For Windows & Linux
  • Privacy Implications of Web 3.0 and Darknets
  • T50 - The Fastest Mixed Packet Injector Tool
  • 160,000 Network Printers Hacked
  • A Look Back At 2015 – Tools & News Highlights
Share
Tweet5
Share1
Buffer2
WhatsApp
Email
8 Shares

Filed Under: Password Cracking Tools Tagged With: brute-forcing, email-hacking, hacking-software, hydra, Password Cracking, password-hacking, thc, thc-hydra



Reader Interactions

Comments

  1. Gouki says

    February 15, 2007 at 2:06 am

    Ubuntu and Debian users have the pre-compiled packages here:

    http://blog.goukihq.org/2006/07/28/the-hackers-choice-hydra-on-ubuntu/

  2. Darknet says

    February 15, 2007 at 5:29 am

    Gouki: Thanks that’ll be useful!

  3. matt says

    February 17, 2007 at 10:01 pm

    Can someone tell me what i did wrong with the login file? I put hydra -L /matt/documents and setting/logins.txt -Anyone got an example to share or can someone provide some help? Thanks

  4. The Mesterious Stranger says

    April 24, 2007 at 12:38 am

    I need help this wont run and i need a good bruteforcer…When i click on hydra a command prompt shows up then dissapers about .5 seconds later. What am i doing wrong?!?!?!?!?!?!?!??!?!?

  5. richard a says

    May 3, 2007 at 8:00 pm

    i’m having the same problem as The Mysterious Stranger above. anybody know what were doing wrong? thanks

  6. onlyforfun says

    June 25, 2007 at 12:44 pm

    hello,this is a good site for learing crack, thank you all.

    i

  7. backbone says

    June 25, 2007 at 1:18 pm

    The Mesterious Stranger

    The windows version has maybe no frontend… have you thought about this? the just start you command prompt and run it from there… a list of options should appear…

  8. Crazum says

    August 6, 2007 at 9:04 pm

    i ran the command prompt, now what. i typed in ./configure and it says that it is unrecognized or something. please help. thanks.

  9. Maiku says

    February 2, 2008 at 9:14 pm

    ummm no exe file?

  10. Pantagruel says

    February 2, 2008 at 10:48 pm

    It’s *nix only, so get Cygwin to run it

  11. Maiku says

    February 2, 2008 at 10:58 pm

    yeah figured that out a few minutes ago xD thanks!

  12. Alex says

    May 9, 2008 at 7:49 pm

    Hello,
    i tried to download the hydra-5.3-win.zip on
    the THC-Hydra homepage, and my anti virus programm detected
    a virus, is this normal for the data??
    pls help me!

  13. Bogwitch says

    May 9, 2008 at 8:49 pm

    It is very usual for hacking tools to be identified as malware. Considering hacking tools are developed by the hacking community, it would be wise to treat any tool you have acquired with a fair degree of suspicion. If you have the ability, tools and techniques to either examine the source code or monitor what the application is actually doing it would probably be best to avoid attempting to hack altogether until you can.
    Additionally, running any hacking tools on your production/ main workstation is a Bad Idea.

  14. Alex says

    May 10, 2008 at 7:04 pm

    ok, thx for your advise!

  15. Alex says

    May 23, 2008 at 1:07 pm

    now i have another problem,
    i downloaded cygwin, wrote the command, but it doesn’t work!
    what can i do?

  16. Bogwitch says

    May 23, 2008 at 6:13 pm

    You’ll need to give a little more information than that. Any error messages? What do you mean ‘it doesn’t work’?

  17. Alex says

    May 23, 2008 at 9:01 pm

    ok, when i write the command, ” no such file or directory” or “Error: Coudn’t find hydra.exe ” appears.

  18. Bogwitch says

    May 23, 2008 at 9:28 pm

    OK, which error do you get under which circumstances?
    Are you running the command from the directory where you extracted the files?
    Is your anti-virus blocking access to the files?

  19. lafluaf says

    October 31, 2008 at 2:39 pm

    You have to store the dll files which comes with the zip package in you x:/cygwin/bin folder and then start it with a dos console.

    it’s a downgrade of the dll used in general

  20. Alex says

    December 3, 2008 at 4:17 pm

    the link to download it does not work. Where can you get a copy of it?

  21. Darknet says

    December 4, 2008 at 6:40 am

    Links updated because you’re too retarded to Google for thc-hydra or just go to the homepage..

  22. bewolf says

    December 16, 2008 at 10:25 am

    i have some probleme:

    Checking for SAP/R3 (librfc/saprfc.h) …
    … NOT found, module sapr3 disabled

    any ideas ?!!
    Thk’s

  23. Haxer says

    February 10, 2009 at 2:22 am

    ok heres how u fix in windows version DOWNLOAD WINDOWS VERSION NOT 1 WERE I HAVE TO DO CONFIGURE AND THAT CRUD

  24. Haxer says

    February 10, 2009 at 2:23 am

    kk now u go to start>run type cmd hit enter
    now cd to where u put the files in
    when ur in folder type this hydra -h now u should see bunch of commands so u type hydra (script here)

  25. jeck says

    March 4, 2009 at 7:56 am

    “coudnt create signal pipe". whats this?

  26. dblackshell says

    March 4, 2009 at 8:40 am

    @jeck: are you running the windows version, or are you running it with cygwin… if the second is the case read the following http://www.cygwin.com/ml/cygwin/2005-02/msg00286.html

  27. T says

    April 23, 2009 at 1:39 am

    I’m confused as to how this program works. Does it enable you to get passwords that have been entered into remote computers?

  28. Casso says

    May 30, 2009 at 3:04 pm

    I can’t downlaod the program. Can anyone upload it on megaupload or rapidshare ? thx

    I don’t speak english very well

  29. Bogwitch says

    May 30, 2009 at 5:33 pm

    @Cosso, if you can’t managee to download the program, you shouldn’t be using it!

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation

Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation

Views: 175

Automated internet traffic will now overtake human activity, presenting sophisticated cyber threats … ...More about Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation

TREVORspray - Credential Spray Toolkit for Azure, Okta, OWA & More

TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More

Views: 342

TREVORspray is a purpose-built password spraying utility designed for red teams and offensive … ...More about TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More

Force Push Scanner - Hunt GitHub Dangling Commits for Leaked Secrets

Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets

Views: 349

Force Push Scanner is an offensive security tool that identifies secrets inadvertently left in … ...More about Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets

Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Views: 5,479

Darknet marketplaces remain central to illicit trade in 2025, with evolving business models, payment … ...More about Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends

Caracal - Rust eBPF Rootkit for Stealthy Post-Exploitation

Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation

Views: 518

Caracal is a new Rust-based eBPF (extended Berkeley Packet Filter) rootkit that provides a stealth … ...More about Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation

Windows_EndPoint_Audit - Endpoint Security Auditing Toolkit

Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit

Views: 574

Windows_EndPoint_Audit from ITAuditMaverick introduces a powerful method for offensive security … ...More about Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (2)
  • Countermeasures (231)
  • Cryptography (84)
  • Dark Web (1)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (432)
  • Forensics (65)
  • GenAI (4)
  • Hacker Culture (9)
  • Hacking News (231)
  • Hacking Tools (688)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (240)
  • Networking Hacking Tools (353)
  • Password Cracking Tools (105)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (236)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (170)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,333,805)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,359)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,839)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,813)
  • Password List Download Best Word List – Most Common Passwords (933,804)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,476)
  • Hack Tools/Exploits (673,480)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,461)

Search

Recent Posts

  • Defending Against Malicious Botnets in 2025 Automated Traffic Threats and Mitigation July 16, 2025
  • TREVORspray – Credential Spray Toolkit for Azure, Okta, OWA & More July 14, 2025
  • Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets July 11, 2025
  • Emerging Darknet Marketplaces of 2025 Anatomy Tactics & Trends July 9, 2025
  • Caracal – Rust eBPF Rootkit for Stealthy Post-Exploitation July 7, 2025
  • Windows_EndPoint_Audit – Endpoint Security Auditing Toolkit July 4, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy