yasserbdj96 / hiphpLinks
The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commands through port 80's POST/GET method, users can access a range of activities such as downloading and editing files. It also allows for connecting to Tor networks with password protection for extra security.
β215Updated last week
Alternatives and similar repositories for hiphp
Users that are interested in hiphp are comparing it to the libraries listed below
Sorting:
- steal chrome saved passwords "undetectable"β51Updated 3 years ago
- Remote persistent πLogger for Windows and Linuxβ296Updated 2 years ago
- β133Updated 2 years ago
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.β139Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.β105Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β121Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)β110Updated last month
- BackdoorSim: An Educational into Remote Administration Toolsβ114Updated last year
- Bypass 403β164Updated 8 months ago
- PacketSpyβ156Updated last year
- The SteaLinG is an open-source penetration testing framework designed for social engineeringβ236Updated last year
- A custom Google search (to bypass some limitations on google and VPNs)β113Updated 2 years ago
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and β¦β40Updated last year
- Clipboard poisoning attack.β58Updated 5 years ago
- PassBreakerβ63Updated last year
- Dark-Shell is a Tool for Generating ReverShell Fileβ114Updated 2 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β142Updated 3 years ago
- β159Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux πΎβ73Updated 2 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapperβ90Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β64Updated 4 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP β¦β35Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modulβ¦β61Updated last year
- Kali Packerge Managerβ65Updated last year
- Redirect All Traffic Through Tor Network For Kali Linuxβ202Updated 6 months ago
- Windows Hacking FrameWork using Reverse Shellβ106Updated 7 months ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.β80Updated last year
- Boost website hits by generating requests from multiple proxy IPs.β75Updated last year
- Perform With Mass Exploiter In Joomla 4.2.8.β34Updated 2 years ago
- Nmap & SQL injection automation toolβ37Updated last year