fish-not-phish / FHook
FHook is a Command and Control server which allows an individual to accept connections from multiple remote clients via a remote access tool.
☆14Updated last year
Alternatives and similar repositories for FHook:
Users that are interested in FHook are comparing it to the libraries listed below
- Dogma V1.5.3☆29Updated 5 years ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 4 years ago
- Hacking with PasteJacking technique☆22Updated 10 months ago
- A very user friendly and advanced phishing toolkit made for hackers☆29Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated 11 months ago
- 🔥Ready, Aim, Fire.🔥☆16Updated 2 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆43Updated last year
- B-UAC, Windows UAC Bypass Trojan Generator☆8Updated 6 years ago
- Hax is a mini-tool with really useful hacking tools.☆18Updated last year
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commands…☆42Updated 3 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆52Updated last year
- remote administrator framework☆21Updated 8 months ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆35Updated 5 months ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 6 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆41Updated 2 years ago
- Cracking protocols FTP and SSH.☆11Updated 8 months ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆15Updated last year
- ☆14Updated 3 years ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆37Updated 3 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- A tool designed to analyse email headers☆33Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated last year
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆18Updated 2 years ago
- Anubis 7.0☆25Updated 7 months ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆75Updated 2 years ago