MadExploits / GeckoLinks
Gecko Backdoor is a most powerful web php backdoor.
☆124Updated 2 months ago
Alternatives and similar repositories for Gecko
Users that are interested in Gecko are comparing it to the libraries listed below
Sorting:
- A simple Ransomware Generator☆48Updated 9 months ago
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆40Updated last year
- LARAPLER - Laravel Random Exploit☆22Updated last year
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- PoC for SQL Injection in CVE-2024-27956☆86Updated last year
- Powerfull Automatic Sql injection Tools Pack☆119Updated 3 years ago
- Bypass 403☆155Updated 5 months ago
- A utility for detecting webpage inputs and conducting XSS scans.☆148Updated last year
- WordPress XML-RPC & WP-Login Bruteforce + Auto Uploader Powerful asynchronous bruteforce tool for WordPress sites via wp-login.php and …☆16Updated 2 months ago
- WpCrack is an audit and brute force tool used to remotely test WordPress blogging software☆102Updated 2 years ago
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆34Updated 2 years ago
- Backdoor PHP shell script.☆74Updated last year
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆108Updated 2 months ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆90Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆24Updated 2 years ago
- MStore API <= 3.9.2 - Authentication Bypass☆6Updated 2 years ago
- Fastest tool to find username and password brute forcing.☆74Updated last year
- Automatically change tor ip address over time when accessing the internet. Make it private and safe for you☆140Updated 7 months ago
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆42Updated 5 months ago
- Huge Collection of Wordpress Exploits and CVES☆124Updated 2 years ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆40Updated 10 months ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integ…☆71Updated last week
- Dios sql injection☆22Updated 4 years ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆21Updated 10 months ago
- Collection of Exploit, CVES(Unauthenticated) and Wordpress Scanners☆97Updated 2 years ago
- DoSinator is a powerful Denial of Service (DoS) testing tool developed in Python.☆136Updated 10 months ago
- PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template☆27Updated 2 months ago
- Discover Domains Associated with a Reverse IP Lookup☆31Updated 5 months ago
- The whole collection of Exploits developed by me (Hacker5preme)☆100Updated 3 years ago
- A super simple asynchronous multithreaded proxy scraper; scraping & checking ~500k HTTP, HTTPS, SOCKS4, & SOCKS5 proxies.☆155Updated 3 months ago