4m3rr0r / Reverse-Shell-WordPress-PluginLinks
A WordPress plugin that provides reverse shell functionality with a graphical user interface (GUI) for configuration. This plugin allows users to configure and initiate a reverse shell connection to a specified IP address and port.
☆14Updated 3 months ago
Alternatives and similar repositories for Reverse-Shell-WordPress-Plugin
Users that are interested in Reverse-Shell-WordPress-Plugin are comparing it to the libraries listed below
Sorting:
- Header Exploitation HTTP☆578Updated last week
- Hack The Box CPTS, CBBH Exam and Lab Reporting / Note-Taking Tool☆231Updated 4 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆392Updated 6 months ago
- Interact with Hackthebox using your terminal - Be faster and more competitive !☆127Updated 3 months ago
- A fast WordPress plugin enumeration tool☆547Updated last week
- This repo is a PoC with to exploit CVE-2023-51467 and CVE-2023-49070 preauth RCE vulnerabilities found in Apache OFBiz.☆74Updated last year
- HTB Certified Penetration Testing Specialist CPTS Study☆217Updated 2 years ago
- All cheetsheets with main information from HTB CBBH role path in one place.☆95Updated last year
- HTTP 403 bypass tool☆523Updated last year
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆349Updated 10 months ago
- Local File Inclusion discovery and exploitation tool☆319Updated 6 months ago
- Koth - TryHackMe Tricks☆177Updated last year
- CVE-2025-29927 Proof of Concept☆80Updated 4 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆621Updated 8 months ago
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆149Updated 4 months ago
- A collection of useful tools and scripts were developed and gathered throughout the Offensive Security's PEN-300 (OSEP) course.☆224Updated 2 weeks ago
- Automation tool to testing and confirm the xss vulnerability.☆278Updated last week
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆114Updated 3 weeks ago
- my kali desktop setup☆301Updated last year
- List of payloads: reverse shell, bind shell, webshell.☆45Updated 4 months ago
- Linux privilege escalation exploits collection.☆138Updated 2 years ago
- Exploiting the xmlrpc.php☆54Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC☆291Updated last year
- A simple tool for bypassing file upload restrictions.☆871Updated last year
- CVE-2024-21413 PoC for THM Lab☆122Updated last year
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆130Updated 3 weeks ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆632Updated 2 months ago
- Phishing with a fake reCAPTCHA☆576Updated 10 months ago
- Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)☆128Updated 11 months ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆663Updated 2 years ago