yasserbdj96 / hiphpLinks
The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commands through port 80's POST/GET method, users can access a range of activities such as downloading and editing files. It also allows for connecting to Tor networks with password protection for extra security.
β216Updated 2 weeks ago
Alternatives and similar repositories for hiphp
Users that are interested in hiphp are comparing it to the libraries listed below
Sorting:
- Remote persistent πLogger for Windows and Linuxβ296Updated 2 years ago
- A custom Google search (to bypass some limitations on google and VPNs)β112Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β119Updated 2 years ago
- PacketSpyβ157Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.β107Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β67Updated 4 years ago
- Bypass 403β163Updated 9 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)β111Updated 2 months ago
- β133Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP β¦β37Updated 2 years ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.β81Updated last year
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and β¦β40Updated 2 years ago
- PassBreakerβ65Updated last year
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.β141Updated last year
- Automated exploit scanner for cameras on the internetβ208Updated last year
- steal chrome saved passwords "undetectable"β51Updated 3 years ago
- Kali Packerge Managerβ65Updated 2 years ago
- Fetching passwords from the chrome browser databaseβ93Updated 2 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systeβ¦β175Updated last year
- A computer programming AI bot in python djangoβ55Updated last year
- Here are +200 different rats some with source codeβ126Updated 2 years ago
- Boost website hits by generating requests from multiple proxy IPs.β75Updated last year
- control windows computeur from telegramβ68Updated 2 years ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in aβ¦β114Updated 6 months ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.β110Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.β51Updated last year
- β160Updated 2 years ago
- Clipboard poisoning attack.β58Updated 5 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability assβ¦β43Updated last month
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux πΎβ73Updated 2 years ago