MadExploits / GeckoLinks
Gecko Backdoor is a most powerful web php backdoor.
☆132Updated 4 months ago
Alternatives and similar repositories for Gecko
Users that are interested in Gecko are comparing it to the libraries listed below
Sorting:
- LARAPLER - Laravel Random Exploit☆22Updated 2 years ago
- A simple Ransomware Generator☆52Updated last year
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆82Updated 2 years ago
- Powerfull Automatic Sql injection Tools Pack☆120Updated 4 years ago
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆41Updated last year
- Fastest tool to find username and password brute forcing.☆76Updated last year
- Bypass 403☆164Updated 10 months ago
- Huge Collection of Wordpress Exploits and CVES☆124Updated 3 years ago
- WpCrack is an audit and brute force tool used to remotely test WordPress blogging software☆107Updated 2 years ago
- WordPress XML-RPC & WP-Login Bruteforce + Auto Uploader Powerful asynchronous bruteforce tool for WordPress sites via wp-login.php and …☆18Updated 8 months ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆24Updated last year
- 「💉」XSS Payload List☆42Updated 2 years ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆93Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆25Updated 2 years ago
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆34Updated 2 years ago
- A utility for detecting webpage inputs and conducting XSS scans.☆159Updated last year
- acunetix-13 install in kali linux☆78Updated 2 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 3 years ago
- 「📖」Tool created to extract metadata from a domain☆14Updated last year
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆75Updated last week
- Boost website hits by generating requests from multiple proxy IPs.☆75Updated last year
- Dios sql injection☆22Updated 4 years ago
- PoC for SQL Injection in CVE-2024-27956☆90Updated last year
- Backdoor PHP shell script.☆84Updated last year
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆116Updated 7 months ago
- Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners☆106Updated 3 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- Obtain the passphrase of a private key (id_rsa), this tool uses the ssh-keygen binary to perform a brute force attack until a successful …☆82Updated 6 months ago
- HackBar is a security audit tool that will enable you to pentest websites more easily. ... You can use it to check site security by perfo…☆149Updated 5 years ago
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload☆10Updated 2 years ago