MadExploits / GeckoLinks
Gecko Backdoor is a most powerful web php backdoor.
☆128Updated 4 months ago
Alternatives and similar repositories for Gecko
Users that are interested in Gecko are comparing it to the libraries listed below
Sorting:
- LARAPLER - Laravel Random Exploit☆23Updated last year
- A simple Ransomware Generator☆52Updated last year
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆41Updated last year
- Bypass 403☆163Updated 9 months ago
- Powerfull Automatic Sql injection Tools Pack☆119Updated 4 years ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- Huge Collection of Wordpress Exploits and CVES☆123Updated 3 years ago
- A utility for detecting webpage inputs and conducting XSS scans.☆159Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆24Updated last year
- PoC for SQL Injection in CVE-2024-27956☆90Updated last year
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆25Updated 2 years ago
- Fastest tool to find username and password brute forcing.☆75Updated last year
- WordPress XML-RPC & WP-Login Bruteforce + Auto Uploader Powerful asynchronous bruteforce tool for WordPress sites via wp-login.php and …☆17Updated 7 months ago
- WpCrack is an audit and brute force tool used to remotely test WordPress blogging software☆107Updated 2 years ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆114Updated 7 months ago
- Boost website hits by generating requests from multiple proxy IPs.☆75Updated last year
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆141Updated last year
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆75Updated this week
- Backdoor PHP shell script.☆85Updated last year
- Automatically change tor ip address over time when accessing the internet. Make it private and safe for you☆148Updated last year
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆92Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆112Updated 2 months ago
- simple recon tool to help you for searching vulnerability on web server☆74Updated 2 weeks ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆106Updated 2 years ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆43Updated 2 years ago
- HackBar is a security audit tool that will enable you to pentest websites more easily. ... You can use it to check site security by perfo…☆147Updated 5 years ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆55Updated 2 months ago
- 「💉」XSS Payload List☆41Updated 2 years ago
- PrivacyNet: Privacy Network☆52Updated last year
- Bypass 403 pages☆124Updated last year