fish-not-phish / FHook
FHook is a Command and Control server which allows an individual to accept connections from multiple remote clients via a remote access tool.
β14Updated last year
Alternatives and similar repositories for FHook:
Users that are interested in FHook are comparing it to the libraries listed below
- Dogma V1.5.3β28Updated 5 years ago
- π₯Ready, Aim, Fire.π₯β16Updated 2 years ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools thβ¦β51Updated 4 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OSβ22Updated last year
- β14Updated 2 years ago
- XDROID is android all in one hack toolsβ34Updated 2 weeks ago
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commandsβ¦β39Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionalsβ34Updated 10 months ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logsβ36Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.β18Updated last year
- DASH is deep osint Scanner. You just need username to start osint scan.β48Updated 2 years ago
- Cracking protocols FTP and SSH.β11Updated 7 months ago
- A very user friendly and advanced phishing toolkit made for hackersβ27Updated 3 years ago
- Hacking with PasteJacking techniqueβ21Updated 8 months ago
- A tool designed to analyse email headersβ33Updated 2 years ago
- β27Updated 2 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocationβ14Updated last year
- An OSINT focused tool made with Nodejs!β92Updated 2 years ago
- Anubis 7.0β25Updated 5 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP β¦β35Updated last year
- An efficient tool To Find click jacking vulnerabilities in easiest way with pocβ22Updated 3 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's reβ¦β22Updated 4 years ago
- It is all in One Pentesting tool . It Has modules , Information Gathering exploitation + vulnerability scanning , proxy scraper and woβ¦β20Updated 2 months ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victimβ¦β16Updated 5 years ago
- B-UAC, Windows UAC Bypass Trojan Generatorβ8Updated 6 years ago
- steal chrome saved passwords "undetectable"β49Updated 3 years ago
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.β52Updated last year
- HacKing Tools Downloader: Downloading HacKing Tools and exporting by categories to $HOME directoryβ82Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple wayβ38Updated last year
- ScanPro - NMap Scanning Scripts ~ Network Mapperβ83Updated 5 months ago