yasserbdj96 / hiphp
The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commands through port 80's POST/GET method, users can access a range of activities such as downloading and editing files. It also allows for connecting to Tor networks with password protection for extra security.
☆210Updated last week
Alternatives and similar repositories for hiphp:
Users that are interested in hiphp are comparing it to the libraries listed below
- Automated OSINT on SwaggerHub☆152Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆100Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆102Updated last year
- PacketSpy☆138Updated 7 months ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆74Updated 6 months ago
- ☆132Updated 2 years ago
- Full Valid Fake Data Generator☆97Updated 4 months ago
- Redirect All Traffic Through Tor Network For Kali Linux☆160Updated 7 months ago
- ☆142Updated last year
- Bypass 403☆124Updated 5 months ago
- BackdoorSim: An Educational into Remote Administration Tools☆101Updated 11 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆276Updated 7 months ago
- A custom Google search (to bypass some limitations on google and VPNs)☆112Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆71Updated 6 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆65Updated last year
- steal chrome saved passwords "undetectable"☆50Updated 2 years ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆113Updated 2 months ago
- An XSS Exploitation Tool☆290Updated this week
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆223Updated 4 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆68Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆58Updated 3 years ago
- IoT Camera Reconnaissance and Live Viewer☆137Updated 6 months ago
- This repository contains a few leaked files of HookBot.☆104Updated last year
- GUI Osint Framework with Kali Linux☆144Updated last year
- Tracer is an OSINT tool that can be used to detect on which websites a username is currently in use☆108Updated last year
- Fastest tool to find username and password brute forcing.☆70Updated last year
- Nmap & SQL injection automation tool☆29Updated 3 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 4 months ago
- simple recon tool to help you for searching vulnerability on web server☆73Updated last week