yasserbdj96 / hiphpLinks
The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commands through port 80's POST/GET method, users can access a range of activities such as downloading and editing files. It also allows for connecting to Tor networks with password protection for extra security.
☆218Updated last month
Alternatives and similar repositories for hiphp
Users that are interested in hiphp are comparing it to the libraries listed below
Sorting:
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆105Updated last year
- A custom Google search (to bypass some limitations on google and VPNs)☆114Updated 2 years ago
- Automated exploit scanner for cameras on the internet☆200Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated 2 years ago
- Bypass 403☆164Updated 6 months ago
- ☆133Updated 2 years ago
- PacketSpy☆156Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆63Updated 4 years ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆138Updated 3 years ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆110Updated 2 years ago
- IoT Camera Reconnaissance and Live Viewer☆157Updated last year
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆138Updated 11 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆175Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆74Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆81Updated last year
- Fetching passwords from the chrome browser database☆91Updated last year
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆89Updated 10 months ago
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆154Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆110Updated 2 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆235Updated last year
- Tracer is an OSINT tool that can be used to detect on which websites a username is currently in use☆117Updated 2 years ago
- A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, res…☆80Updated 2 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆195Updated 5 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- A computer programming AI bot in python django☆53Updated last year
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆93Updated 3 months ago
- An forensics tool to help aid in the investigation of spoofed emails based off the email headers.☆171Updated 4 years ago