Shell Detector – is a application that helps you find and identify php/cgi(perl)/asp/aspx shells. Shell Detector has a “web shells” signature database that helps to identify “web shell” up to 99%.
☆410Dec 31, 2019Updated 6 years ago
Alternatives and similar repositories for Shell-Detector
Users that are interested in Shell-Detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Web Shell Detector – is a php script that helps you find and identify php/cgi(perl)/asp/aspx shells. Web Shell Detector has a “web shells…☆822Oct 5, 2015Updated 10 years ago
- ☆480Nov 28, 2025Updated 5 months ago
- Detect potentially malicious PHP files☆1,478Oct 20, 2023Updated 2 years ago
- findWebshell是一款基于python开发的webshell检测工具。☆325Nov 14, 2018Updated 7 years ago
- CloudWalker Platform☆675Dec 14, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Loki - Simple IOC and YARA Scanner☆3,756Jan 12, 2026Updated 4 months ago
- 很简单的webshell扫描☆54Aug 8, 2017Updated 8 years ago
- Advanced Web Shell☆580May 1, 2017Updated 9 years ago
- Webshell扫描工具,通过各种规则和算法实现服务器脚本后门查杀☆121Aug 22, 2016Updated 9 years ago
- Multi-Thread Vulnerability Verify Framework☆55Oct 25, 2018Updated 7 years ago
- 被动式漏洞扫描系统☆868Nov 1, 2017Updated 8 years ago
- 跨平台 webshell 静态扫描器☆33Jan 17, 2018Updated 8 years ago
- Incident Response Forensic Framework☆610Nov 20, 2019Updated 6 years ago
- Jenkins漏洞探测、用户抓取爆破☆165Mar 13, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Hackhttp is an HTTP library, written in Python.☆414Jun 23, 2016Updated 9 years ago
- This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后渗透后…☆197Aug 29, 2015Updated 10 years ago
- CMS识别 python gevent实现☆213Jan 12, 2019Updated 7 years ago
- webshell sample for WebShell Log Analysis☆419Feb 24, 2022Updated 4 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 5 years ago
- CVE-2017-10271 POC☆29Jan 10, 2018Updated 8 years ago
- The Most Comprehensive Docker Security Scanner☆1,541May 15, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Attack Detection☆1,360Aug 31, 2022Updated 3 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆331Apr 19, 2017Updated 9 years ago
- 分享PHP WebShell 绕过WAF 的一些经验 Share some experience about PHP WebShell bypass WAF and Anti-AV☆302Oct 30, 2017Updated 8 years ago
- Linux Exploit Suggester; based on operating system release number☆1,814May 19, 2014Updated 12 years ago
- Responsible for visualization the vulhub and docker☆128Jun 10, 2021Updated 4 years ago
- Python2编写的struts2漏洞全版本检测和利用工具☆1,412May 7, 2019Updated 7 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- 使用机器学习识别WebShell☆128Oct 26, 2017Updated 8 years ago
- ☆279Apr 6, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Automatic SQL injection with Charles and sqlmap api☆821May 1, 2018Updated 8 years ago
- This is a webshell open source project☆10,729Dec 24, 2024Updated last year
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,169Mar 6, 2025Updated last year
- Repository of yara rules☆4,799Apr 17, 2024Updated 2 years ago
- Simple reverse ICMP shell☆1,615Apr 6, 2018Updated 8 years ago
- Python Decoders for Common Remote Access Trojans☆1,117Jul 16, 2024Updated last year
- java unserialize vul for weblogic exploit☆175Jul 20, 2018Updated 7 years ago