MadExploits / Gecko
Gecko Backdoor is a most powerful web php backdoor.
☆115Updated last month
Alternatives and similar repositories for Gecko:
Users that are interested in Gecko are comparing it to the libraries listed below
- LARAPLER - Laravel Random Exploit☆22Updated last year
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆40Updated 10 months ago
- A simple Ransomware Generator☆46Updated 5 months ago
- Powerfull Automatic Sql injection Tools Pack☆111Updated 3 years ago
- acunetix-13 install in kali linux☆67Updated last year
- Bypass 403☆140Updated last month
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integ…☆65Updated 2 weeks ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆105Updated 9 months ago
- Discover Domains Associated with a Reverse IP Lookup☆32Updated last month
- Payload for bug bounty☆93Updated 8 months ago
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆34Updated last year
- PoC for SQL Injection in CVE-2024-27956☆85Updated 11 months ago
- Dios sql injection☆22Updated 4 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆63Updated 10 months ago
- Fastest tool to find username and password brute forcing.☆72Updated last year
- Bypass 403 pages☆111Updated 9 months ago
- Huge Collection of Wordpress Exploits and CVES☆123Updated 2 years ago
- WpCrack is an audit and brute force tool used to remotely test WordPress blogging software☆98Updated 2 years ago
- Web Exploit here ! advanced web hacking and hacker toolkit in your hands☆35Updated 7 months ago
- An Simple PHP Webshell Manager to bypassed security system☆18Updated 7 months ago
- Basically pipes.sh but rewritten in Python☆14Updated last month
- Backdoor PHP shell script.☆70Updated 8 months ago
- A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely.☆244Updated 4 months ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆22Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆20Updated 7 months ago
- Detect Program Bug Bounty☆38Updated 2 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆38Updated 7 months ago
- Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners☆89Updated 2 years ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆89Updated 2 years ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆82Updated last year