Threat Emulation and Red Teaming Framework, The Hacking Software for normal people.

logo

The Remote Hacker Probe is a Threat Emulation and Red Teaming Framework built to be easy to use.

  • The Remote Hacker Probe is Feature Rich! Including, Keystroke Logging, Reflective DLL Injection, Reverse Shell, Password Recovery, etc.
  • Remote Hacker Probe Core is open source and constantly improved. and is no longer being updated or worked on.
  • Fast and Lightweight, Remote Hacker Probe is coded in Java meaning it will run anywhere in a JRE and Client in C++ for Native Windows.

The Remote Hacker Probe had 2 versions, Open Source and Professional Version. That have been merged into one and the source code of the Professional Version is also now open source. For more information click here.

Please do not use the Remote Hacker Probe or any Software for Black Hat Activity. The Remote Hacker Probe is made for Authorized Penetration testing, Demonstrations and Reasearch. The Author is not responsible for any sort of misuse or damage caused by the program.


Installation & Usage

  1. Download Java 11+. Most preferrably Java 15.
  2. Download the Zip Attached in the Latest Release.
  3. Run the file run-on-linux.desktop OR run-on-windows.bat
  4. Getting Started with Remote Hacker Probe or see Video.

Server Features :

  • Visually Appealing and Theme able Graphical User Interface featuring Dark, Light, Solarized Dark and Solarized Light themes.
  • Built for ease and usability, Remote Hacker Probe is extremely easy to use and Set up.
  • The Server is coded in Java meaning it is Cross Platform! It will run anywhere in a Java Runtime Environment (JRE).
  • Event Logging.
  • High Speed File Upload / Download.

Main Features :

Probe Client :

The Probe Client is a Standalone EXE containing all malicious code. This is the file used to take remote control over a Computer.

  • Reflective DLL Injection (Custom + Read Output / Pass Parameters to DLL)
  • Download, Upload, Delete and browse the entire file System.
  • Reverse Shell, Full Access to the command line.
  • Scan Remote Network for hosts.
  • Port scan hosts in the Target Network.
  • Scan Remote Network for hosts vulerable to Eternal Blue
  • Get Process Information by Process name.
  • Geolocate Client using IP Address.
  • Shutdown / Restart the Remote PC.
  • Grab screenshot of the Remote PC.
  • Record Microphone input.
  • Add to Startup Persistence on command.
  • Display Message box.
  • Open URLS in the default browser.
  • USB Infection.
  • Active Window logging.
  • UAC Status shown in main table.
  • Client Path shown in main table.
  • Keylogger.
  • Password Recovery.
    • Pidgin.
    • FileZilla.
    • Vault & IE.
    • WinSCP.
    • WiFi.
    • Credential Manager.
  • Task Manager.

Reflective Loader Client :

The Reflective Loader Client is stripped of most features except Reflective DLL Injection. IT establishes connection and runs Payloads in memory from the server. Using the Reflective Loader Client you have the advantage of running Completely in memory.

  • Reflective Probe Payload (Runs the Probe Client in memory)
  • Message Box Payload (Displays a Message Box as the process it was injected into)
  • Open URL Payload (Opens a url as the process it was injected into)
  • Elevation Payload (Triggers UAC Prompt for the Process it was injected into as ‘WindowsDefender.exe’)
  • Add / View Windows Defender Exclusions.
  • Reverse Shell.
  • Task Manager.
  • Reflective DLL Injection (Custom + Read Output / Pass Parameters to DLL)

Tutorials and Posts


Bugs

  • Remote Shell Upload Vulnerability in RHP Server, Fixed. ✔️
  • Unauthorized File Upload to RHP Server, Fixed. ✔️
  • Reflective Loader fails. ✔️

Screenshots

1

Thanks to

Developer

Hi my name's Fahad. You may contact me, on Discord or My Website

LICENSE

VIEW LICENSE

The Developer is not responsible for any misuse or Damage caused by the program. This is created only to innovate InfoSec and YOU. 👈

Donate

Help me with my future projects. Thank you. Donate with Crypto

Comments
  • client won't reconnect after server restart

    client won't reconnect after server restart

    When i stop the server and run it again (i'm talking about stop/killing the application and run it again. Not rebooting the machine). Clients won't connect back to the server unless i execute the evil file once more. Is this a bug or a feature :sweat_smile:

  • Connection Reset - why :(

    Connection Reset - why :(

    i am getting this error when a client connects

    [INFO] New connection from : /REDACTED:65366
    java.net.SocketException: Connection reset
            at java.base/sun.nio.ch.NioSocketImpl.implRead(NioSocketImpl.java:323)
            at java.base/sun.nio.ch.NioSocketImpl.read(NioSocketImpl.java:350)
            at java.base/sun.nio.ch.NioSocketImpl$1.read(NioSocketImpl.java:803)
            at java.base/java.net.Socket$SocketInputStream.read(Socket.java:976)
            at java.base/java.io.InputStream.read(InputStream.java:218)
            at rhp.Server.getInformation(Server.java:158)
            at rhp.Server$1.run(Server.java:267)
            at java.base/java.lang.Thread.run(Thread.java:831)
    

    this is the settings i use

    Annotation 2021-11-23 214611

    java --version
    java 16.0.2 2021-07-20
    Java(TM) SE Runtime Environment (build 16.0.2+7-67)
    Java HotSpot(TM) 64-Bit Server VM (build 16.0.2+7-67, mixed mode, sharing)
    
  • Suggestion

    Suggestion

    Hi I know you might be busy This is just a suggestion can you add support for IRC,HTTP so it doesn't just rely on port forwading Like Saefko Attack systems where I live port forwading is pain in the ass expecting a reply Thanks.

  • It doesn't like Java SE 16 very much?

    It doesn't like Java SE 16 very much?

    when i run the run-on-linux.desktop, it won't do anything. So i ran java -jar RHP.jar in the terminal, it gives me error:

    Error: LinkageError occurred while loading main class rhp.MainWindow
            java.lang.UnsupportedClassVersionError: rhp/MainWindow has been compiled by a more recent version of the Java Runtime (class file version 60.0), this version of the Java Runtime only recognizes class file versions up to 55.0
    

    I installed the latest version of Java SE 16, i know the reccommendation is Java 15 but downloading it require register and that's a hassle

  • Doesn't seem to open

    Doesn't seem to open

    Hey, I've stuck this on a fresh virtual machine. I downloaded and installed Java and the RHP icon has changed to the java logo as expected, but when I either open the "run on Windows" bat file, or directly open the RHP file in Java, nothing happens.

    Well, to be more specific, run on windows bat brings up cmd for a fraction of a second and the nothing, and RHP shows a loading icon on the mouse, also for a fraction of a second, but that's it. I've tried twice, with seperate virtual machines, with antivirus off on both my host machine and the guest machine (downloaded to host and moved to guest).

    Am I being stupid here?

    Thanks

  • UI problem

    UI problem

    After starting RHP.jar (java -jar RHP.jar) on both Windows 10 and Fedora 34, all I get is window without any elements. Latest Java 16 JDK is installed on both OSes. I know that this project is not updated, but it would be nice to have a fix...

    image

    image

  • Some questions.

    Some questions.

    Hello, I’m Alpha. I’m new to pen testing, and came across this repo. I have a question, what do you use to configure the client? Do I use my public or private IP address? What port do I put it as? Also, does the client only work on computers connected to the same network as I? Please give a step-by-step explanation as I am very new to pen testing and don’t know much.Thank you!

  • Windows version has no upgrade, build or settings buttons

    Windows version has no upgrade, build or settings buttons

    I downloaded the app on java se 17 and everything works fine, the app opens perfectly, but there are not buttons along the top to use the tool. pls help

  • Ngrok and local

    Ngrok and local

    Thank you for your work! Great project ! I have a question sir. When connecting ngrok form build , what to do with the local network settings ? I can't connect ngrok as well as locally. Thank you.

  • Developement Updates

    Developement Updates

    Dear Sir, There is no doubt that this project is a great worship, but i am wondering if you have a plan to encrypt the communication channel. As is seen form the source code, it is using plain socket now and can not evade from AVs. Faithfully.

Dec 25, 2022
This is new projec based in apps to chat or messages people to people

Stranger This is new projec based in apps to chat or messages people to people Esta aplicacion tendra las siguientes caracteristicas: 1* Es 100% segur

Nov 3, 2021
JeVois-Pro People Counter : Implement people counter on JeVois-Pro Deep Learning Smart Camera
JeVois-Pro People Counter : Implement  people counter  on JeVois-Pro Deep Learning Smart Camera

JeVois-Pro People Counter Refer to the OpenCV People Counter article to implement a people counter on the JeVois-Pro Deep Learning Smart Camera. First

Nov 10, 2021
Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as "adversary simulation software designed to execute targeted attacks and emulate the post-exploitation actions of advanced threat actors".
 	Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as

COBALT STRIKE 4.4 Cobalt Strike is a commercial, full-featured, remote access tool that bills itself as "adversary simulation software designed to exe

Aug 21, 2022
The purpose of these streams is to be educational and entertaining for viewers to learn about systems architecture, reverse engineering, software security, etc., and NOT to encourage nor endorse malicious game hacking.
The purpose of these streams is to be educational and entertaining for viewers to learn about systems architecture, reverse engineering, software security, etc., and NOT to encourage nor endorse malicious game hacking.

Memestream This repository holds the code that I develop during my live game "modding" ?? sessions. When I stream, I like to speedrun making a success

Jul 6, 2022
Violent Fungus is a command and control (C2) software suite, providing red teams post-exploitation persistence and other juicy stuff.

Violent Fungus is a command and control (C2) software suite, providing red teams post-exploitation persistence and other juicy stuff.

Sep 7, 2022
AI Powered Hacking Environment, A Software For Hackers, Social Engineers, Penetration Testers.
AI Powered Hacking Environment, A Software For Hackers, Social Engineers, Penetration Testers.

Digital Eagle (Digle) (Note: This Project isn't Finished Yet, it's Under Development, Some Tools will not work) Hell0 W0rld This Project Focus Firstly

Oct 22, 2022
Gauss Stylization - Interactive tool for normal driven stylization

Interactive tool for normal driven stylization. A set of preferred normals can be chosen arbitrarily from the Gauss sphere, including semi-discrete sets to model preference for cylinder- or cone-like shapes.

Dec 6, 2022
Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emulation
Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emulation

Sloth ?? Sloth is a fuzzing setup that makes use of libFuzzer and QEMU’s user-mode emulation (qemu/linux-user) on x86_64/aarch64 host to emulate aarch

Nov 29, 2022
Software to support people learning OpenMP with our book

Software to support people learning OpenMP with our book ... The OpenMP Common Core: Making OpenMP Simple Again

Dec 14, 2022
Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider
Combining Sealighter with unpatched exploits to run the Threat-Intelligence ETW Provider

Sealighter-TI Combining Sealighter with unpatched exploits and PPLDump to run the Microsoft-Windows-Threat-Intelligence ETW Provider without a signed

Dec 26, 2022
A collection of open source threat detection rules created by Cyber Castle's team.

Open Threat Detection Rules As a part of our role towards the cyber security community, we decided to publish some of our detection use cases to give

Jun 3, 2022
Tooling and Scripts for Hacking Super Street Fighter II Cabinets

sf-cabinet Tools and utilities for modifying SF2 Cabinets What This repository contains research and tooling around the mini Street Fighter 2 cabinet

Oct 29, 2022
Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.

Overview Matryoshka loader is a tool that red team operators can leverage to generate shellcode for an egghunter to bypass size-limitations and perfor

Dec 15, 2022
The MLX90614 is an Infra Red thermometer for noncontact temperature measurements.
The MLX90614 is an Infra Red thermometer for noncontact temperature measurements.

The MLX90614 is an Infra Red thermometer for noncontact temperature measurements.

Dec 23, 2022
This repo contains information about EDRs that can be useful during red team exercise.

EDRs This repo contains information about EDRs that can be useful during red team exercise. patch_syscall_dynamically64.c This proof-of-concept is res

Dec 29, 2022
The goal of this project was to create my own red team campaign that would emulate some of the TTPs from the above campaign analysis

The goal of this project was to create my own red team campaign that would emulate some of the TTPs from the above campaign analysis. During my endeavor I decdied to switch from a complete mimick to a substitute / exclude / improve upon certain tactics that I deemed unnecessary. I will write an accompanying blog post which will be linked here once it is published.

Dec 1, 2022
the ares multi-system console emulation suite
the ares multi-system console emulation suite

ares ares is a multi-system emulator that began development on October 14th, 2004. It is a descendent of higan and bsnes, and focuses on accuracy and

Jan 7, 2023
Emulation of classic VA synths of the late 90s/2000s that featured the Motorola 56300 family DSP

Gearmulator Emulation of classic VA synths of the late 90s/2000s that used the Motorola 56300 family DSP This project aims at emulating various musica

Jan 5, 2023