PHPEB is a small tool that generates and stores obfuscated shellcode in user specified EXIF handlers.
☆80Apr 17, 2017Updated 8 years ago
Alternatives and similar repositories for PHP-EXIF-Backdoors-generator-using-custom-shellcode
Users that are interested in PHP-EXIF-Backdoors-generator-using-custom-shellcode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- ☆13Oct 12, 2017Updated 8 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Oct 21, 2017Updated 8 years ago
- Small Backdoor/rootkit for linux kernel☆21Jan 26, 2014Updated 12 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- Home made trojan (c/c++)☆12Apr 14, 2023Updated 2 years ago
- This is php backdoor hack to access directory, access to mysql, access to execute shell command☆25Oct 23, 2015Updated 10 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Javascript DE-Obfuscator used to deobfuscate JS generated by javascriptobfuscator.com☆11Mar 6, 2020Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- alternative to procdump☆11May 26, 2021Updated 4 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- ☆23Oct 11, 2019Updated 6 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Oct 16, 2019Updated 6 years ago
- 稳定多线程中的inline hook☆16Jun 19, 2019Updated 6 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Attack Knowledge Base☆101Jul 5, 2017Updated 8 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- PHP LockIt Deobfuscator☆10Nov 3, 2015Updated 10 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Feb 18, 2025Updated last year
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- procfs-based PHP sandbox bypass☆133Sep 19, 2018Updated 7 years ago
- libssh CVE-2018-10933☆22Oct 20, 2018Updated 7 years ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Metasploit reverse TCP stager fully undetectable☆18Nov 29, 2015Updated 10 years ago
- ☆11Mar 19, 2019Updated 7 years ago