yasserbdj96 / hiphpLinks
The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commands through port 80's POST/GET method, users can access a range of activities such as downloading and editing files. It also allows for connecting to Tor networks with password protection for extra security.
☆218Updated 3 weeks ago
Alternatives and similar repositories for hiphp
Users that are interested in hiphp are comparing it to the libraries listed below
Sorting:
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆104Updated last year
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆136Updated 10 months ago
- PacketSpy☆155Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated last year
- Bypass 403☆155Updated 5 months ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆233Updated last year
- A custom Google search (to bypass some limitations on google and VPNs)☆114Updated 2 years ago
- Here are +200 different rats some with source code☆103Updated last year
- A computer programming AI bot in python django☆51Updated last year
- Automated exploit scanner for cameras on the internet☆196Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆108Updated last year
- Full Valid Fake Data Generator☆99Updated 9 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆135Updated 3 years ago
- control windows computeur from telegram☆68Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- ☆132Updated 2 years ago
- simple recon tool to help you for searching vulnerability on web server☆74Updated 4 months ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆108Updated last year
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆191Updated 2 years ago
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆194Updated 3 months ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated 10 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆172Updated last year
- Dark-Shell is a Tool for Generating ReverShell File☆115Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆62Updated last year
- Find Email Spoofing Vulnerablity of domains☆96Updated 11 months ago
- OSINT Framework : A python based Open Source Intelligence CLI framework similar to Metasploit.☆175Updated 3 weeks ago