elliottophellia / ophelliaLinks
A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.
☆24Updated this week
Alternatives and similar repositories for ophellia
Users that are interested in ophellia are comparing it to the libraries listed below
Sorting:
- Cloudpanel 0-day Exploit☆57Updated last year
- Gecko Backdoor is a most powerful web php backdoor.☆124Updated 2 months ago
- BackdoorSim: An Educational into Remote Administration Tools☆104Updated last year
- Simple Powershell Http shell With WEB UI☆72Updated 3 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integ…☆71Updated last week
- MStore API <= 3.9.2 - Authentication Bypass☆6Updated 2 years ago
- D3Ext's Forward Shell☆120Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆108Updated last year
- Gmail/GSuite account enumeration tool☆51Updated last year
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆39Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆109Updated 2 years ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.☆90Updated 2 years ago
- A Cobalt Strike Beacon Notifier Via Telegram Bot.☆16Updated last year
- scscanner is tool to read website status code response from the lists.☆40Updated 2 years ago
- Domain Parser for IPAddress.com Reverse IP Lookup☆83Updated 2 years ago
- ☆132Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆24Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆45Updated 7 years ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 2 years ago
- Zimbra CVE-2022-27925 PoC☆43Updated 2 years ago
- A powerful reverse shell generator☆44Updated 3 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 3 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆105Updated 2 years ago
- Fastest tool to find username and password brute forcing.☆74Updated last year
- Exploits targeting vBulletin.☆76Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆96Updated 11 months ago
- Huge Collection of Wordpress Exploits and CVES☆124Updated 2 years ago