CCSIR / PHP-EXIF-Backdoors-generator-using-custom-shellcode
PHPEB is a small tool that generates and stores obfuscated shellcode in user specified EXIF handlers.
☆79Updated 7 years ago
Alternatives and similar repositories for PHP-EXIF-Backdoors-generator-using-custom-shellcode:
Users that are interested in PHP-EXIF-Backdoors-generator-using-custom-shellcode are comparing it to the libraries listed below
- Get information client with getdatareport (Plugin)☆25Updated 8 years ago
- Exploit Wordpress Plugin Revolution Slider - Unrestricted File Upload☆25Updated 9 years ago
- pwning & info gathering via user browser☆39Updated 9 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Updated 10 years ago
- PHP Web shell based off WSO☆39Updated 10 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Updated 7 years ago
- library and intepreter for penetration testing tools☆29Updated 8 years ago
- Duncan - Blind SQL injector skeleton☆56Updated 3 years ago
- Collection of tools for privesc on Linux☆34Updated 11 years ago
- Pentest Scripts for Apache Vulnerabilities☆31Updated 7 years ago
- Joomla 3.2 to 3.4.4 Remote SQL Injection Mass Exploit☆28Updated 3 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- CodeIgniter <=2.1.4 session cookie decryption vulnerability☆39Updated 8 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 10 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated last month
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆84Updated 7 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- Projects and POCs☆60Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Go command line app to exploit file upload vulnerability☆12Updated 8 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- Script to find exploitable magic methods for PHP object injection☆27Updated 10 years ago
- ☆34Updated 8 years ago
- AutoBrowser Screenshot☆48Updated 8 years ago