Shell Detector – is a application that helps you find and identify php/cgi(perl)/asp/aspx shells. Shell Detector has a “web shells” signature database that helps to identify “web shell” up to 99%.
☆409Dec 31, 2019Updated 6 years ago
Alternatives and similar repositories for Shell-Detector
Users that are interested in Shell-Detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Shell Detector – is a php script that helps you find and identify php/cgi(perl)/asp/aspx shells. Web Shell Detector has a “web shells…☆824Oct 5, 2015Updated 10 years ago
- ☆480Nov 28, 2025Updated 4 months ago
- Detect potentially malicious PHP files☆1,476Oct 20, 2023Updated 2 years ago
- findWebshell是一款基于python开发的webshell检测工具。☆326Nov 14, 2018Updated 7 years ago
- CloudWalker Platform☆676Dec 14, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Loki - Simple IOC and YARA Scanner☆3,742Jan 12, 2026Updated 2 months ago
- 很简单的webshell扫描☆54Aug 8, 2017Updated 8 years ago
- Advanced Web Shell☆580May 1, 2017Updated 8 years ago
- Webshell扫描工具,通过各种规则和算法实现服务器脚本后门查杀☆121Aug 22, 2016Updated 9 years ago
- Multi-Thread Vulnerability Verify Framework☆55Oct 25, 2018Updated 7 years ago
- 被动式漏洞扫描系统☆870Nov 1, 2017Updated 8 years ago
- 跨平台 webshell 静态扫描器☆33Jan 17, 2018Updated 8 years ago
- Incident Response Forensic Framework☆612Nov 20, 2019Updated 6 years ago
- Jenkins漏洞探测、用户抓取爆破☆165Mar 13, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Hackhttp is an HTTP library, written in Python.☆415Jun 23, 2016Updated 9 years ago
- This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后渗透后…☆197Aug 29, 2015Updated 10 years ago
- CMS识别 python gevent实现☆213Jan 12, 2019Updated 7 years ago
- The Most Comprehensive Docker Security Scanner☆1,534Apr 4, 2026Updated last week
- webshell sample for WebShell Log Analysis☆419Feb 24, 2022Updated 4 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- Attack Detection☆1,360Aug 31, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CVE-2017-10271 POC☆29Jan 10, 2018Updated 8 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Apr 19, 2017Updated 8 years ago
- Linux Exploit Suggester; based on operating system release number☆1,814May 19, 2014Updated 11 years ago
- 分享PHP WebShell 绕过WAF 的一些经验 Share some experience about PHP WebShell bypass WAF and Anti-AV☆303Oct 30, 2017Updated 8 years ago
- Responsible for visualization the vulhub and docker☆128Jun 10, 2021Updated 4 years ago
- Python2编写的struts2漏洞全版本检测和利用工具☆1,416May 7, 2019Updated 6 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- This is a webshell open source project☆10,714Dec 24, 2024Updated last year
- 使用机器学习识别WebShell☆128Oct 26, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Automatic SQL injection with Charles and sqlmap api☆821May 1, 2018Updated 7 years ago
- ☆278Apr 6, 2023Updated 3 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,161Mar 6, 2025Updated last year
- Python Decoders for Common Remote Access Trojans☆1,118Jul 16, 2024Updated last year
- Repository of yara rules☆4,748Apr 17, 2024Updated last year
- Simple reverse ICMP shell☆1,617Apr 6, 2018Updated 8 years ago
- java unserialize vul for weblogic exploit☆176Jul 20, 2018Updated 7 years ago