• Stars
    star
    233
  • Rank 172,230 (Top 4 %)
  • Language
    C
  • License
    MIT License
  • Created almost 4 years ago
  • Updated over 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.

logo

The Remote Hacker Probe is a Threat Emulation and Red Teaming Framework built to be easy to use.

  • The Remote Hacker Probe is Feature Rich! Including, Keystroke Logging, Reflective DLL Injection, Reverse Shell, Password Recovery, etc.
  • Remote Hacker Probe Core is open source and will be improved over time.
  • Fast and Lightweight, Remote Hacker Probe is coded in Java meaning it will run anywhere in a JRE and Client in C++ for Native Windows.

The Remote Hacker Probe had 2 versions, Open Source and Professional Version. That have been merged into one and the source code of the Professional Version is also now open source. For more information click here.

Please do not use the Remote Hacker Probe or any Software for Black Hat Activity. The Remote Hacker Probe is a Personal Development Project and is made for Authorized Penetration testing, Demonstrations and Reasearch. The Author is not responsible for any sort of misuse or damage caused by the program.


Installation & Usage

  1. Download Java 11+. Most preferrably Java 15.
  2. Download the Zip Attached in the Latest Release.
  3. Run the file run-on-linux.desktop OR run-on-windows.bat
  4. Getting Started with Remote Hacker Probe or see Video.

Server Features :

  • Visually Appealing and Theme able Graphical User Interface featuring Dark, Light, Solarized Dark and Solarized Light themes.
  • Built for ease and usability, Remote Hacker Probe is extremely easy to use and Set up.
  • The Server is coded in Java meaning it is Cross Platform! It will run anywhere in a Java Runtime Environment (JRE).
  • Event Logging.
  • High Speed File Upload / Download.

Main Features :

Probe Client :

The Probe Client is a Standalone EXE containing all malicious code. This is the file used to take remote control over a Computer.

  • Reflective DLL Injection (Custom + Read Output / Pass Parameters to DLL)
  • Download, Upload, Delete and browse the entire file System.
  • Reverse Shell, Full Access to the command line.
  • Scan Remote Network for hosts.
  • Port scan hosts in the Target Network.
  • Scan Remote Network for hosts vulerable to Eternal Blue
  • Get Process Information by Process name.
  • Geolocate Client using IP Address.
  • Shutdown / Restart the Remote PC.
  • Grab screenshot of the Remote PC.
  • Record Microphone input.
  • Add to Startup Persistence on command.
  • Display Message box.
  • Open URLS in the default browser.
  • USB Infection.
  • Active Window logging.
  • UAC Status shown in main table.
  • Client Path shown in main table.
  • Keylogger.
  • Password Recovery.
    • Pidgin.
    • FileZilla.
    • Vault & IE.
    • WinSCP.
    • WiFi.
    • Credential Manager.
  • Task Manager.

Reflective Loader Client :

The Reflective Loader Client is stripped of most features except Reflective DLL Injection. IT establishes connection and runs Payloads in memory from the server. Using the Reflective Loader Client you have the advantage of running Completely in memory.

  • Reflective Probe Payload (Runs the Probe Client in memory)
  • Message Box Payload (Displays a Message Box as the process it was injected into)
  • Open URL Payload (Opens a url as the process it was injected into)
  • Elevation Payload (Triggers UAC Prompt for the Process it was injected into as ‘WindowsDefender.exe’)
  • Add / View Windows Defender Exclusions.
  • Reverse Shell.
  • Task Manager.
  • Reflective DLL Injection (Custom + Read Output / Pass Parameters to DLL)

Tutorials and Posts


Bugs

  • Remote Shell Upload Vulnerability in RHP Server, Fixed. ✔️
  • Unauthorized File Upload to RHP Server, Fixed. ✔️
  • Reflective Loader fails. ✔️
  • JavaSE 16 GUI Bug.

Screenshots

1

Thanks to

Developer

Hi my name's Fahad. You may contact me, on Discord or My Website

LICENSE

VIEW LICENSE

The Developer is not responsible for any misuse or Damage caused by the program. This is created only to innovate InfoSec and YOU. 👈

Donate

Help me with my future projects. Thank you. Donate with Crypto

More Repositories

1

paradoxiaRAT

ParadoxiaRat : Native Windows Remote access Tool.
C
769
star
2

maalik

Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
C
94
star
3

supercharge

Fully Undetectable Native C++ Remote Access Agent / Botnet.
Python
87
star
4

NetworkStealer

Phishing Framework for Facebook, Gmail, Twitter, WiFi, Windows.
Python
58
star
5

claw

Source code of Claw Key logger previously sold on HackForums
C++
52
star
6

orphicMETA

A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.
C++
24
star
7

iris

Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.
Python
21
star
8

urlsploit

Payload delivery via URL and some social engineering.
CSS
17
star
9

blackvision

Command line Remote Access tool (RAT) targeting Windows Systems.
Python
15
star
10

Beacon

Beacon is a Pretty Basic Program to help you Learn how Remote Access tools work.
Python
14
star
11

orphicAC

Demonstration of Google Chrome Passwords theft
Python
10
star
12

keplerpulse

KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable on it.
Python
10
star
13

thawne

Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Thawne keeps checking if your File Exists on the System and is Running. If it's not running then Start it, If it does not exist or is removed Reinstall it.
C
10
star
14

Neutron

Automate Compilation of Windows Binaries on any Linux Dist!
Python
8
star
15

ProjectFPH

Project FPH(Project Facebook Phish). Facebook Phishing Script.
CSS
8
star
16

xkeyverify

Simple Key Verification system for client side applications.
PHP
6
star
17

TheDestroyer

TheDestroyer is a Framework that Generates Malware that'll ruin/Destroy a Windows Machine. This is made for Teaching/Educational Purposes only.
Python
6
star
18

ricardovirus

Dancin till the break of dawn, Dancinnnn.
C++
5
star
19

UAficionado

Red Team vs Blue Team. Series of 5 challanges. Are you up for it?
C
5
star
20

handlerhijack

MSF:Handler_Hijack is a Tool Designed for Systems Compromised by Metasploit Multi/Handler and Reverse_tcp payload.
Ruby
5
star
21

ftpfilecheck

A simple Python script to check files on FTP Server
Python
4
star
22

light-matter

Light Matter is a Program made for the Person learning. A Versatile one that can also be used to Prank your Friends.
Python
4
star
23

orphicmeta_old

Get a computers Google Chrome Passwords uploaded to your FTP Server.
Python
4
star
24

quantumcore.github.io

Website Hosted with GitHub Pages
JavaScript
3
star
25

test

test
PowerShell
3
star
26

DedVirus

A Computer Virus
3
star
27

BurpGraphQl

This is a Python module for controlling / automating Burpsuite Enterprise via their GraphQL API.
Python
2
star
28

google-foobar-challenge-Number-station-Coded-Messages

Java
2
star