MadExploits / Gecko
Gecko Backdoor is a most powerful web php backdoor.
☆112Updated 3 weeks ago
Alternatives and similar repositories for Gecko:
Users that are interested in Gecko are comparing it to the libraries listed below
- Powerfull Automatic Sql injection Tools Pack☆111Updated 3 years ago
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆40Updated 9 months ago
- LARAPLER - Laravel Random Exploit☆22Updated last year
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆22Updated last year
- A simple Ransomware Generator☆47Updated 4 months ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integ…☆64Updated last week
- Discover Domains Associated with a Reverse IP Lookup☆30Updated 2 weeks ago
- acunetix-13 install in kali linux☆60Updated last year
- Backdoor PHP shell script.☆70Updated 7 months ago
- Bypass 403☆126Updated 2 weeks ago
- PoC for SQL Injection in CVE-2024-27956☆84Updated 10 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆103Updated 8 months ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆18Updated 6 months ago
- An Simple PHP Webshell Manager to bypassed security system☆18Updated 6 months ago
- Bypass 403 pages☆109Updated 8 months ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆89Updated last year
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆28Updated 2 months ago
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆34Updated last year
- JSNinja is a powerful tool designed for security researchers and developers looking to extract sensitive information and Urls from JavaSc…☆118Updated 3 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆61Updated 9 months ago
- Bypass WAF SQL Injection SQLMAP☆183Updated 2 years ago
- Dios sql injection☆22Updated 4 years ago
- Web Exploit here ! advanced web hacking and hacker toolkit in your hands☆35Updated 6 months ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆83Updated last year
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆62Updated 6 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆100Updated last year
- Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners☆66Updated 2 years ago
- Fastest tool to find username and password brute forcing.☆71Updated last year
- Automatically change tor ip address over time when accessing the internet. Make it private and safe for you☆130Updated 2 months ago