several list of simple and obfuscate PHP shell
☆196Aug 30, 2022Updated 3 years ago
Alternatives and similar repositories for Tiny-PHP-Webshell
Users that are interested in Tiny-PHP-Webshell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- tools to encoding and decoding strings or cipher, may be can help in CTF☆24Mar 22, 2023Updated 3 years ago
- ☆11Nov 8, 2022Updated 3 years ago
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Sep 8, 2018Updated 7 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- ☆16Dec 15, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Sending file through ICMP packet using PING☆22Jul 18, 2024Updated last year
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆185May 15, 2022Updated 3 years ago
- ☆17Dec 2, 2021Updated 4 years ago
- OSWE Preparation☆669Jul 25, 2022Updated 3 years ago
- Ivanti EPM SQL Injection Remote Code Execution Vulnerability☆26Jun 12, 2024Updated last year
- ☆1,010Jan 23, 2023Updated 3 years ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Dec 24, 2023Updated 2 years ago
- ☆28Oct 18, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- COLI (Command Orchestration & Logic Interface) – A visual orchestration layer for EWE, built for bug bounty automation. Create and run CL…☆35Oct 15, 2025Updated 5 months ago
- Powershell tool to automate Active Directory enumeration.☆1,289Sep 9, 2025Updated 6 months ago
- The Serverless Blind XSS App☆338Feb 21, 2026Updated last month
- X-Platform bind shell in TypeScript!☆29Jul 11, 2025Updated 8 months ago
- Simple HTTP listener for security testing☆20Oct 7, 2022Updated 3 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆19Mar 8, 2021Updated 5 years ago
- Manajemen dan monitoring pengeluaran Anda, only single user tidak untuk dikomersialkan☆20Mar 13, 2026Updated 2 weeks ago
- A plugin to get our hackerone reports data into obsidian☆12Jan 28, 2026Updated 2 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆316Sep 30, 2025Updated 6 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- Blazing fast, advanced Padding Oracle exploit☆267Dec 12, 2025Updated 3 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆19May 29, 2023Updated 2 years ago
- A collection of one off hacks and simple scripts☆26Mar 21, 2023Updated 3 years ago
- A simple tool for bypassing file upload restrictions.☆896Jul 22, 2024Updated last year
- ☆17Oct 18, 2025Updated 5 months ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆309Jul 4, 2023Updated 2 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Feb 20, 2021Updated 5 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,214Jan 5, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Tricking shells into interactive mode when local PTY's are not available☆146Jul 11, 2022Updated 3 years ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆121Jan 23, 2024Updated 2 years ago
- Burp Suite Certified Practitioner Exam Study☆1,356Mar 12, 2026Updated 2 weeks ago
- Powerview on steroids☆912Mar 10, 2026Updated 2 weeks ago
- 「📖」Tool created to extract metadata from a domain☆14Dec 7, 2024Updated last year
- This tool aims at accumulating javascript files from a given set of subdomains to discover hidden endpoints. It swims through JS files to…☆71Dec 28, 2022Updated 3 years ago
- Sqlitez☆21Oct 11, 2025Updated 5 months ago