1337r0j4n / php-backdoors
php backdoors ( collection )
☆139Updated last month
Related projects: ⓘ
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆279Updated 8 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆295Updated 3 weeks ago
- Docker Remote API Scanner and Exploit☆152Updated 10 months ago
- Bypass 403☆110Updated last month
- An XSS Exploitation Tool☆257Updated this week
- ☆110Updated 7 months ago
- Tool to create XSS PDF files☆32Updated 3 months ago
- Huge Collection of Wordpress Exploits and CVES☆121Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆250Updated 3 months ago
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆205Updated 2 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆69Updated 2 months ago
- Generate FUD backdoors☆235Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆201Updated 2 months ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆39Updated last year
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆86Updated 2 months ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆84Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆81Updated last year
- Helios: Automated XSS Testing☆124Updated last month
- Reverse shell that can bypass windows defender detection☆151Updated 7 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆118Updated last week
- Unauthenticated Remote Code Execution – Bricks <= 1.9.6☆144Updated 6 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆98Updated last month
- 📲 Enumerate information from an app based on the APK file☆107Updated last month
- CVE-2024-21413 PoC for THM Lab☆28Updated 6 months ago
- Automated Tool for Testing Header Based Blind SQL Injection☆261Updated last year
- SQL Injection Vulnerability Scanner made with Python☆329Updated last year
- CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support☆53Updated 2 months ago
- ShodanX is a tool to gather information of targets using shodan dorks⚡.☆146Updated 5 months ago
- Backdoor PHP shell script.☆57Updated 2 months ago