MadExploits / Gecko
Gecko Backdoor is a most powerful web php backdoor.
☆103Updated last month
Related projects ⓘ
Alternatives and complementary repositories for Gecko
- A simple Ransomware Generator☆37Updated last month
- LARAPLER - Laravel Random Exploit☆21Updated 10 months ago
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆41Updated 5 months ago
- Powerfull Automatic Sql injection Tools Pack☆111Updated 3 years ago
- Backdoor PHP shell script.☆63Updated 4 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆62Updated 5 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆38Updated last month
- Payload for bug bounty☆81Updated 4 months ago
- ☆62Updated 2 months ago
- JSNinja is a powerful tool designed for security researchers and developers looking to extract sensitive information and Urls from JavaSc…☆68Updated 2 weeks ago
- Bypass 403☆117Updated 2 months ago
- ☆47Updated 5 months ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆26Updated 8 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆89Updated 4 months ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆23Updated last year
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆35Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆41Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆71Updated 4 months ago
- ProxyChecker Made in NodeJS☆36Updated 2 years ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆39Updated last year
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆90Updated last year
- ☆39Updated last year
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆84Updated last year
- CVE-2023-4634☆45Updated last year
- Automatic tool to find Google Dorks☆31Updated 2 weeks ago
- Docker Remote API Scanner and Exploit☆152Updated 11 months ago
- Bypass 403 pages☆100Updated 4 months ago