This is php backdoor hack to access directory, access to mysql, access to execute shell command
☆25Oct 23, 2015Updated 10 years ago
Alternatives and similar repositories for php-backdoor
Users that are interested in php-backdoor are comparing it to the libraries listed below
Sorting:
- the zero-impact configuration system☆10Aug 8, 2020Updated 5 years ago
- a simple netcat wrapper☆16Apr 10, 2017Updated 8 years ago
- Home made trojan (c/c++)☆12Apr 14, 2023Updated 2 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Oct 21, 2017Updated 8 years ago
- Small Backdoor/rootkit for linux kernel☆21Jan 26, 2014Updated 12 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Revok is an online self-service web application security scanner, finding common web security issues with minimal cost.☆17May 13, 2015Updated 10 years ago
- A Linux Kernel Module that adds a backdoor to your system☆39Mar 18, 2009Updated 17 years ago
- This program show you IMSI numbers of cellphones around you.☆12Nov 14, 2020Updated 5 years ago
- PHPEB is a small tool that generates and stores obfuscated shellcode in user specified EXIF handlers.☆80Apr 17, 2017Updated 8 years ago
- A simple shell script to easily setup an ARK node☆14Oct 12, 2018Updated 7 years ago
- Kali linux virtual machine termux☆12Jun 18, 2021Updated 4 years ago
- Shows Ip address and Family of a website☆16Sep 26, 2021Updated 4 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- ATOP formally A ton of Privacy, a swissarmyknife for investigations on TON blockchain.☆24Jul 29, 2024Updated last year
- Malaysia Elite Hacker Team☆11Jan 29, 2025Updated last year
- Send Ether or tokens via links (Server)☆16Nov 27, 2018Updated 7 years ago
- Let's you read package.json from any directory☆25Jun 29, 2018Updated 7 years ago
- Simple python client to upload files to the transfer.sh service☆10Dec 19, 2016Updated 9 years ago
- This project is designed to enumerate back-end hosting Content Management Systems and aid security professionals in detecting vulnerabili…☆17Mar 14, 2017Updated 9 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Aug 17, 2018Updated 7 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- database of all Intel cpus☆30Feb 14, 2022Updated 4 years ago
- ☆26Jul 12, 2023Updated 2 years ago
- An implementation of an OCR to get questions from an image and queries them on GPT-3.5☆12Mar 15, 2023Updated 3 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- Transform a simple plain-text database to JSON☆15Nov 14, 2022Updated 3 years ago
- Unrar recursively (no longer maintained, fork away)☆15Jul 15, 2013Updated 12 years ago
- A easy to use and universal web application install tool.☆24Oct 2, 2020Updated 5 years ago
- Notifications when metasploit msf session up or down in telegram.☆11Feb 20, 2018Updated 8 years ago
- ☆10Mar 19, 2019Updated 7 years ago
- SpyEye v1.3 bug exploiter (frm_findftp_sub.php)☆19Sep 19, 2018Updated 7 years ago
- This is a source code for android smartphone hardware testing solely for educational purposes.☆26May 3, 2017Updated 8 years ago
- Terraform's provider for generate iptables rules with iptables-api☆12Mar 6, 2023Updated 3 years ago
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆39Apr 23, 2025Updated 11 months ago
- ☆12Oct 29, 2015Updated 10 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago