PHP 8 and safe-build Update of the popular C99 variant of PHP Shell.
☆17Feb 14, 2022Updated 4 years ago
Alternatives and similar repositories for C99Shell-PHP8
Users that are interested in C99Shell-PHP8 are comparing it to the libraries listed below
Sorting:
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- A NIGHT miner for the Midnight Scavenger Hunt☆40Jan 19, 2026Updated last month
- ☆14May 14, 2022Updated 3 years ago
- Autonomous navigation simulation of an agricultural robot during soil fertilization in open fields using ROS and Gazebo.☆10Apr 8, 2025Updated 11 months ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- A web app that automagically creates musical melodies☆11Jan 6, 2019Updated 7 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- scuttlebot plugin for indexing all link mentions of messages☆10Aug 28, 2020Updated 5 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- code for reverse system on big shredder☆14May 12, 2020Updated 5 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 5 months ago
- a collection of wordlist for different projects☆12Oct 12, 2024Updated last year
- SMS flooding tool☆23May 3, 2025Updated 10 months ago
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 7 months ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Network scanning tool designed to detect and report changes in open ports and services over time☆13Oct 16, 2025Updated 4 months ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆13May 25, 2025Updated 9 months ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- ☆16Aug 25, 2025Updated 6 months ago
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 6 months ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- This repository is a collection of notes, links, tutorials, and experiences aimed at helping others. If you find it useful, please consid…☆19Jun 24, 2025Updated 8 months ago
- ☆12Aug 25, 2023Updated 2 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- WP Juicer Tool for quick scanning of confidential information on WordPress endpoints.☆10Apr 30, 2024Updated last year
- Same @Mebus/cupp tool but best speed and Creates every possible word using the information you provide.☆21Nov 30, 2025Updated 3 months ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- ☆11Feb 6, 2023Updated 3 years ago
- It's the collection of all common Question and answers that can possibly come in your exam, if you just complete these question's you wil…☆13Mar 26, 2023Updated 2 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- ☆11May 15, 2020Updated 5 years ago
- A tool that automates fileless SSH backdoor injection—bypassing CA checks, erasing logs, creating long‑lived (up to 9999 days) passwordle…☆28Jan 30, 2026Updated last month
- Prototype for 3D printable linear motion carriage with recirculating Delrin/Nylon balls, for use with aluminium extrusion☆16May 2, 2014Updated 11 years ago