several list of simple and obfuscate PHP shell
☆194Aug 30, 2022Updated 3 years ago
Alternatives and similar repositories for Tiny-PHP-Webshell
Users that are interested in Tiny-PHP-Webshell are comparing it to the libraries listed below
Sorting:
- ☆11Nov 8, 2022Updated 3 years ago
- tools to encoding and decoding strings or cipher, may be can help in CTF☆24Mar 22, 2023Updated 2 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Dec 24, 2023Updated 2 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- Sending file through ICMP packet using PING☆21Jul 18, 2024Updated last year
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Sep 8, 2018Updated 7 years ago
- OSWE Preparation☆668Jul 25, 2022Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆19May 29, 2023Updated 2 years ago
- ☆28Oct 18, 2022Updated 3 years ago
- Aizawa is a command-line webshell designed to execute commands through HTTP header☆67Nov 23, 2025Updated 3 months ago
- ☆997Jan 23, 2023Updated 3 years ago
- ☆16Dec 15, 2021Updated 4 years ago
- Powershell tool to automate Active Directory enumeration.☆1,286Sep 9, 2025Updated 6 months ago
- A plugin to get our hackerone reports data into obsidian☆12Jan 28, 2026Updated last month
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Feb 20, 2021Updated 5 years ago
- Java反序列化漏洞学习☆14Jul 1, 2021Updated 4 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆315Sep 30, 2025Updated 5 months ago
- The Serverless Blind XSS App☆338Feb 21, 2026Updated 2 weeks ago
- That repository contains my updates to the well know java deserialization exploitation tool ysoserial.☆185May 15, 2022Updated 3 years ago
- PDF Files for Pentesting☆700Oct 4, 2024Updated last year
- POC for Veeam Backup and Replication CVE-2023-27532☆71Mar 28, 2023Updated 2 years ago
- Powerview on steroids☆890Updated this week
- ☆16Dec 2, 2021Updated 4 years ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,199Jan 5, 2026Updated 2 months ago
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆118Oct 9, 2025Updated 5 months ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆19Mar 8, 2021Updated 5 years ago
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆131Mar 10, 2022Updated 4 years ago
- X-Platform bind shell in TypeScript!☆29Jul 11, 2025Updated 7 months ago
- This tool aims at accumulating javascript files from a given set of subdomains to discover hidden endpoints. It swims through JS files to…☆70Dec 28, 2022Updated 3 years ago
- PP-finder Help you find gadget for prototype pollution exploitation☆189Aug 8, 2024Updated last year
- ☆10Aug 9, 2024Updated last year
- Burp Suite Certified Practitioner Exam Study☆1,325Feb 5, 2026Updated last month
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆80Nov 2, 2023Updated 2 years ago
- A simple tool for bypassing file upload restrictions.☆893Jul 22, 2024Updated last year
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆308Jul 4, 2023Updated 2 years ago