The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commands through port 80's POST/GET method, users can access a range of activities such as downloading and editing files. It also allows for connecting to Tor networks with password protection for extra security.
☆215Feb 10, 2026Updated last month
Alternatives and similar repositories for hiphp
Users that are interested in hiphp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- ☆22Jul 15, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 3 years ago
- ☆120Mar 28, 2025Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Aug 16, 2023Updated 2 years ago
- A dynamic unpacking tool☆149Sep 17, 2023Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Jul 19, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Nov 22, 2019Updated 6 years ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- Exploits targeting vBulletin.☆74Apr 15, 2023Updated 2 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆275May 10, 2024Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- WordPress Sites Vulnerability Checker for CVE-2020-35489 - "Educational Use Only"☆12Jan 21, 2024Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆95Dec 2, 2025Updated 3 months ago
- ☆38Jun 5, 2023Updated 2 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Rust in-memory dumper☆108Jul 26, 2023Updated 2 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 3 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- web network analyzer☆14Dec 3, 2023Updated 2 years ago
- D3Ext's Forward Shell☆120Oct 15, 2023Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆112Jul 15, 2023Updated 2 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆162Feb 22, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- #IP #Information How to Track IPLocation & IP Information Hack || Termux Hacking [Tab to Copy Command] $ apt up…☆16Oct 1, 2020Updated 5 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆550Feb 10, 2024Updated 2 years ago
- A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.☆213Jan 2, 2023Updated 3 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- Remote persistent 🔑Logger for Windows and Linux☆295Apr 21, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago