Injects php payloads into jpeg images
☆539Nov 28, 2020Updated 5 years ago
Alternatives and similar repositories for php-jpeg-injector
Users that are interested in php-jpeg-injector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆281Aug 4, 2021Updated 4 years ago
- CVE-2021-40444☆66Dec 19, 2021Updated 4 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,173Jan 21, 2026Updated 3 months ago
- 💀 Generate malicious PDF test files for testing phone-home callbacks, SSRF, XSS, NTLM credential theft, and data exfiltration in PDF vie…☆3,673Apr 20, 2026Updated 2 weeks ago
- Image Payload Creating/Injecting tools☆1,292Nov 30, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Small python script to look for common vulnerabilities on SMTP server.☆48Dec 17, 2023Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,171May 13, 2023Updated 2 years ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆164Jul 11, 2021Updated 4 years ago
- A PHP backdoor management and generation tool/C2 featuring end to end encrypted payload streaming designed to bypass WAF, IDS, SIEM syste…☆282Sep 14, 2022Updated 3 years ago
- A simple tool for bypassing file upload restrictions.☆901Jul 22, 2024Updated last year
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Vaf is a cross-platform very advanced and fast web fuzzer written in nim☆318May 29, 2022Updated 3 years ago
- Yet another content discovery tool☆118Nov 16, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- An automated SSRF finder. Just give the domain name and your server and chill! ;) Also has options to find XSS and open redirects☆973Dec 8, 2021Updated 4 years ago
- A script for automatize boolean-based blind SQL injections (MVP).☆54Aug 29, 2022Updated 3 years ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Aug 31, 2022Updated 3 years ago
- Web Service write in Python for control and protect your android device remotely.☆192Dec 14, 2022Updated 3 years ago
- JSshell - JavaScript reverse/remote shell☆630Dec 20, 2022Updated 3 years ago
- File upload vulnerability scanner and exploitation tool.☆3,317May 8, 2025Updated 11 months ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,985Oct 4, 2025Updated 7 months ago
- HTTP Request Smuggling Detection Tool☆538Dec 21, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets.☆519Jun 22, 2022Updated 3 years ago
- A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning☆515Jul 5, 2023Updated 2 years ago
- 🚀 A DNS automated scanner and tool 🖱️ (Zone Transfer, DNS Zone Takeover, Subdomain Takeover).☆300Oct 5, 2024Updated last year
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- ⚡Chrome extension allows you to create lists of Google and Github dork to open multiple tabs with one click, import "scope/out of scope" …☆138Dec 1, 2023Updated 2 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆607Mar 19, 2022Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,194Jan 22, 2026Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A simple PHP web backdoor allows you to retrieve directory/file contents and upload file(s) from the local machine or remote URL.☆20Sep 18, 2021Updated 4 years ago
- ☆145Jul 25, 2022Updated 3 years ago
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆381Mar 8, 2023Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 5 years ago
- An XSS exploitation command-line interface and payload generator.☆1,417Jan 19, 2025Updated last year
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆891Feb 23, 2026Updated 2 months ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆454Jan 9, 2024Updated 2 years ago