Hacking WordPress Plugins - Authenticated Shell Upload, by compromising admin console and upload a malicious plugin with PHP (reverse shell code)
β21Sep 22, 2024Updated last year
Alternatives and similar repositories for Malicious_Plugin
Users that are interested in Malicious_Plugin are comparing it to the libraries listed below
Sorting:
- π’ Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supβ¦β17Dec 1, 2025Updated 3 months ago
- Fuzzing with the generated argument and environment variableβ10Jul 14, 2022Updated 3 years ago
- Exploit ConnectWise ScreenConnect (bypass authentication)β13Feb 21, 2024Updated 2 years ago
- This repository is for Red Teamers, security researchers, AI enthusiasts, and students to learn about adversarial attacks on AI/LLM systeβ¦β21Sep 30, 2025Updated 5 months ago
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by β¦β49Jan 31, 2026Updated last month
- A super-fast proxy server port scannerδΈδΈͺθΆ ηΊ§εΏ«ηη«―ε£ζ«ζε¨β24Aug 31, 2025Updated 6 months ago
- Repository for tools used for the OSCPβ23Sep 18, 2025Updated 5 months ago
- β13Jan 3, 2021Updated 5 years ago
- β11Nov 27, 2021Updated 4 years ago
- HITB SECCONF CTF 2023. Developed with β€οΈ by Hackerdom team and HITB.β16Sep 6, 2023Updated 2 years ago
- A Security Operations playbook to assist blue teamers from day-to-day tasks to Digital Forensics and Incident Response (DFIR) activities.β22Updated this week
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.β15Jul 30, 2020Updated 5 years ago
- Lightweight && straight forward command-line tool for searching and downloading exploits from Exploit-DB.β47Jan 22, 2026Updated last month
- A tool for mapping cypher databasesβ16Jan 20, 2026Updated last month
- β37Aug 6, 2025Updated 7 months ago
- Spring Cloud Function Vulnerable Application / CVE-2022-22963β19Apr 1, 2022Updated 3 years ago
- Kerberos CNAME abuse PoCβ83Jan 27, 2026Updated last month
- Jury System for attack-defence ctf game (ctf-scoreboard). Or you can use it for training.β28Updated this week
- A penetration testing Swiss Army Knife that's suitable for CTF challenges, bug bounty hunting and red team assessments.β31Feb 19, 2026Updated 2 weeks ago
- Massive collection of 772+ PowerShell scripts for Azure management. CI/CD with PSScriptAnalyzer, security scanning, and IaC validation. Eβ¦β38Oct 3, 2025Updated 5 months ago
- Basic script to generate reverse shell payloads, generally most used in ctf.β27Mar 20, 2024Updated last year
- β24May 26, 2021Updated 4 years ago
- DeepSeek Pentest AI - Burp Suite extensionβ56Sep 14, 2025Updated 5 months ago
- This project is an AES loader for c2 shellcodeβ36Jan 24, 2024Updated 2 years ago
- β36Nov 26, 2024Updated last year
- β40Nov 6, 2023Updated 2 years ago
- KrbRoastParser is a tool for parsing Kerberos packets from pcap files to extract AS-REQ, AS-REP and TGS-REP hashesβ58Sep 12, 2025Updated 5 months ago
- Interract with Microsoft SQL Server (MS SQL | MSSQL) servers and their linked instances in restricted environments, without the need for β¦β53Updated this week
- Fuzzing with the generated argumentβ33Jan 6, 2023Updated 3 years ago
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.β44Jan 13, 2024Updated 2 years ago
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.β166May 14, 2024Updated last year
- Proof-of-concept exploit for CVE-2024-25153.β42Mar 13, 2024Updated last year
- HTML parser for PEAS output with additional featuresβ124Feb 15, 2026Updated 3 weeks ago
- A comprehensive collection of various techniques and methods for bypassing Two-Factor Authentication (2FA) security mechanisms.β74Jan 1, 2025Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalwareβ55Apr 28, 2022Updated 3 years ago
- a C# implementation for a shellcode loader that capable to bypass Cortex XDR and Sophos EDR.β93May 24, 2025Updated 9 months ago
- Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading β¦β143Feb 14, 2026Updated 3 weeks ago
- Acunetix Premium v24.10.241106172 | Linuxβ96Dec 26, 2024Updated last year
- The Azure Execution Toolβ135Feb 6, 2026Updated last month