MadExploits / Gecko
Gecko Backdoor is a most powerful web php backdoor.
☆111Updated 3 weeks ago
Alternatives and similar repositories for Gecko:
Users that are interested in Gecko are comparing it to the libraries listed below
- Powerfull Automatic Sql injection Tools Pack☆111Updated 3 years ago
- LARAPLER - Laravel Random Exploit☆21Updated last year
- Backdoor PHP shell script.☆69Updated 6 months ago
- A simple Ransomware Generator☆45Updated 3 months ago
- Bypass 403☆124Updated 5 months ago
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆40Updated 8 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆61Updated 8 months ago
- acunetix-13 install in kali linux☆57Updated last year
- Payload for bug bounty☆92Updated 6 months ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆23Updated last year
- A utility for detecting webpage inputs and conducting XSS scans.☆141Updated 8 months ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆16Updated 5 months ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆84Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆71Updated 6 months ago
- ☆64Updated 5 months ago
- HackBar is a security audit tool that will enable you to pentest websites more easily. ... You can use it to check site security by perfo…☆136Updated 4 years ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆92Updated last year
- WpCrack is an audit and brute force tool used to remotely test WordPress blogging software☆94Updated last year
- ☆47Updated 7 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆42Updated last year
- JSNinja is a powerful tool designed for security researchers and developers looking to extract sensitive information and Urls from JavaSc…☆115Updated last month
- SQL Injection Vulnerability Scanner made with Python☆338Updated last year
- Tool for automate bug hunting process 🔍 --> 🍭☆33Updated 5 months ago
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆35Updated last year
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integ…☆64Updated this week
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆60Updated 5 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆101Updated 6 months ago
- Tool to create XSS PDF files☆40Updated 7 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 4 months ago
- An XSS Exploitation Tool☆290Updated this week