PHP 7 and safe-build update of the popular C99 variant of PHP Shell with MySQL support
☆29Dec 1, 2019Updated 6 years ago
Alternatives and similar repositories for C99-WebShell
Users that are interested in C99-WebShell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PHP WebShell Backdoor for Access all dir/file in the Website.☆14Jul 29, 2021Updated 4 years ago
- sap netweaver 0day poc by shinyhunters (scattered lapsus$ hunters) affecting all 7.x CVE-2025-31324☆21Aug 15, 2025Updated 7 months ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 4 years ago
- My personal tech blog☆16Dec 13, 2024Updated last year
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ThreadsApp is a web application built with a purpose of helping people learn web application security.☆17Nov 22, 2024Updated last year
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- ☆14Sep 24, 2012Updated 13 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- ☆36Nov 30, 2023Updated 2 years ago
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- ☆12Jan 12, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Binary Ninja script to decrypt strings in Mirai samples☆21Jun 30, 2021Updated 4 years ago
- Get some useful data from Clouds for your targets☆20Apr 5, 2026Updated last week
- ☆23May 28, 2021Updated 4 years ago
- is a tool to automate and organize reconnaissance operations.☆25Sep 6, 2023Updated 2 years ago
- ☆11Jun 5, 2020Updated 5 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- CVE-2022-30190 | MS-MSDT Follina One Click☆20Jun 3, 2022Updated 3 years ago
- Hidden input parameters finder☆19Jul 10, 2023Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆14May 15, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- shell over icmp☆34May 18, 2013Updated 12 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated 2 years ago
- A Powershell MP3 player.☆26Jan 2, 2026Updated 3 months ago
- Malware that we analyzed on our site.☆27Nov 12, 2025Updated 5 months ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 3 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆11Mar 1, 2022Updated 4 years ago
- Various PowerShell scripts that may be useful during red team exercise☆21Apr 28, 2022Updated 3 years ago
- GiveWP PHP Object Injection exploit☆77Jan 12, 2025Updated last year
- 🔑 A service which provides continuous user authentication to web applications, using keystroke dynamics.☆13Oct 24, 2018Updated 7 years ago
- Scans for indications of an XSS, Oracle SQLi and filters out words containing MySQL.☆28Mar 26, 2025Updated last year
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago