MadExploits / GeckoLinks
Gecko Backdoor is a most powerful web php backdoor.
☆128Updated 2 weeks ago
Alternatives and similar repositories for Gecko
Users that are interested in Gecko are comparing it to the libraries listed below
Sorting:
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆41Updated last year
- A simple Ransomware Generator☆48Updated 10 months ago
- PoC for SQL Injection in CVE-2024-27956☆88Updated last year
- LARAPLER - Laravel Random Exploit☆22Updated last year
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integ…☆74Updated this week
- Powerfull Automatic Sql injection Tools Pack☆118Updated 4 years ago
- WpCrack is an audit and brute force tool used to remotely test WordPress blogging software☆104Updated 2 years ago
- acunetix-13 install in kali linux☆74Updated 2 years ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆90Updated 2 years ago
- WordPress XML-RPC & WP-Login Bruteforce + Auto Uploader Powerful asynchronous bruteforce tool for WordPress sites via wp-login.php and …☆17Updated 4 months ago
- Bypass 403☆165Updated 6 months ago
- Backdoor PHP shell script.☆78Updated last year
- Huge Collection of Wordpress Exploits and CVES☆124Updated 2 years ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆110Updated 3 months ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆21Updated last year
- 「📖」Tool created to extract metadata from a domain☆14Updated 8 months ago
- A utility for detecting webpage inputs and conducting XSS scans.☆153Updated last year
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆34Updated 2 years ago
- Bypass 403 pages☆118Updated last year
- Automatically change tor ip address over time when accessing the internet. Make it private and safe for you☆144Updated 8 months ago
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆66Updated last year
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆24Updated 2 years ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆40Updated 2 years ago
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆26Updated 4 months ago
- Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners☆99Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated 2 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆105Updated 2 years ago
- PrivacyNet: Privacy Network☆52Updated 11 months ago