yasserbdj96 / hiphpLinks
The BackDoor of HIPHP gives you the power to control websites based on PHP using HTTP/HTTPS protocol. By sending files, tokens and commands through port 80's POST/GET method, users can access a range of activities such as downloading and editing files. It also allows for connecting to Tor networks with password protection for extra security.
☆216Updated 3 weeks ago
Alternatives and similar repositories for hiphp
Users that are interested in hiphp are comparing it to the libraries listed below
Sorting:
- Remote persistent 🔑Logger for Windows and Linux☆296Updated 2 years ago
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆165Updated this week
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆107Updated 2 years ago
- A custom Google search (to bypass some limitations on google and VPNs)☆113Updated 2 years ago
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆142Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆112Updated 3 months ago
- PacketSpy☆158Updated last year
- Windows Hacking FrameWork using Reverse Shell☆105Updated 9 months ago
- Fetching passwords from the chrome browser database☆91Updated 2 years ago
- ☆133Updated 2 years ago
- Sifter - All purpose penetration testing op-center☆81Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆238Updated last year
- Boost website hits by generating requests from multiple proxy IPs.☆75Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆80Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆118Updated 2 years ago
- Full Valid Fake Data Generator☆101Updated last year
- Clipboard poisoning attack.☆57Updated 5 years ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Here are +200 different rats some with source code☆138Updated 2 years ago
- PassBreaker☆65Updated last year
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆90Updated 8 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆74Updated 2 years ago
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆40Updated 2 years ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆109Updated 2 years ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆191Updated 2 years ago
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆44Updated 7 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- Automated exploit scanner for cameras on the internet☆215Updated last year