Gecko Backdoor is a most powerful web php backdoor.
☆143Aug 8, 2025Updated 7 months ago
Alternatives and similar repositories for Gecko
Users that are interested in Gecko are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LazyRev for Lazy People☆21Jul 5, 2023Updated 2 years ago
- Yet another PHP Obfuscator☆33Jan 28, 2026Updated last month
- Web Reconnaissance and Analyst☆20Jul 12, 2022Updated 3 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Domain Grabber Made With Love :3☆13May 3, 2025Updated 10 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆17Feb 26, 2026Updated last month
- Automated enumeration for red teamers☆11Nov 22, 2022Updated 3 years ago
- Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.☆23Jul 16, 2025Updated 8 months ago
- This repository contains a proof-of-concept exploit script for CVE-2025-32432, a pre-authentication Remote Code Execution (RCE) vulnerabi…☆24Apr 27, 2025Updated 11 months ago
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Jan 26, 2024Updated 2 years ago
- MB Bank Balance Notifier là một ứng dụng iOS mô phỏng thông báo biến động số dư tài khoản MB Bank. Ứng dụng này giúp bạn kiểm tra và trải…☆13Jul 27, 2024Updated last year
- AntiRansomware Linux Kernel Module☆37May 25, 2023Updated 2 years ago
- ☆145Mar 19, 2026Updated last week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Mass Reverse IP Lookup is a multithreaded tool to reverse ip lookup a list of ip addresses using yougetsignal.com .☆21May 23, 2020Updated 5 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆20Nov 9, 2023Updated 2 years ago
- Scalable URL obfuscator service☆11Feb 14, 2023Updated 3 years ago
- ☆50Sep 19, 2025Updated 6 months ago
- URLs very strong obfuscation tool (can be used in requests too)☆17Oct 3, 2024Updated last year
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload☆10Feb 9, 2023Updated 3 years ago
- NemesisTools PowerFull Hacking Tools☆54Jan 8, 2025Updated last year
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Multiple Shells of the same code with different extentions.☆15May 14, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- python based latest zombie bot v.14☆18Mar 23, 2021Updated 5 years ago
- ☆27Aug 5, 2019Updated 6 years ago
- Ini adalah kumpulan webshell atau backdoor yang lengkap☆18Aug 18, 2024Updated last year
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆43Feb 27, 2026Updated 3 weeks ago
- ☆19Dec 1, 2025Updated 3 months ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- ☆13May 24, 2023Updated 2 years ago
- A freeroam gamemode for San Andreas Multiplayer (gta sa mod)☆14Oct 22, 2019Updated 6 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆28Oct 3, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- SQLNUKE is telegram based SQLinjection BOT☆10Jan 20, 2018Updated 8 years ago
- Discover Domains Associated with a Reverse IP Lookup☆36Nov 23, 2025Updated 4 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Jun 6, 2021Updated 4 years ago
- ☆12Jan 30, 2025Updated last year
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- ProxyChecker Made in NodeJS☆37Mar 15, 2022Updated 4 years ago
- WEB API fuzzing☆23Apr 30, 2025Updated 10 months ago