yasserbdj96 / hiphpLinks
The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commands through port 80's POST/GET method, users can access a range of activities such as downloading and editing files. It also allows for connecting to Tor networks with password protection for extra security.
☆217Updated 2 months ago
Alternatives and similar repositories for hiphp
Users that are interested in hiphp are comparing it to the libraries listed below
Sorting:
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆64Updated 4 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆105Updated 2 years ago
- ☆133Updated 2 years ago
- PacketSpy☆156Updated last year
- Bypass 403☆165Updated 7 months ago
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago
- A custom Google search (to bypass some limitations on google and VPNs)☆113Updated 2 years ago
- ScanPro - NMap Scanning Scripts ~ Network Mapper☆91Updated 11 months ago
- Clipboard poisoning attack.☆59Updated 5 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆109Updated last week
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆236Updated last year
- PassBreaker☆63Updated last year
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆111Updated 2 years ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆194Updated 2 years ago
- Kali Packerge Manager☆65Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆80Updated last year
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆136Updated last year
- ☆159Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆121Updated 2 years ago
- Here are +200 different rats some with source code☆117Updated last year
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆45Updated 7 years ago
- A computer programming AI bot in python django☆53Updated last year
- Full Valid Fake Data Generator☆101Updated last year
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year
- Boost website hits by generating requests from multiple proxy IPs.☆74Updated last year
- simple recon tool to help you for searching vulnerability on web server☆73Updated 7 months ago
- Automated exploit scanner for cameras on the internet☆202Updated last year
- 🔮 Python Remote administration tool via telegram☆53Updated 5 months ago
- A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, res…☆80Updated 2 years ago