flast101 / php-8.1.0-dev-backdoor-rceLinks
PHP 8.1.0-dev Backdoor System Shell Script
☆93Updated 4 years ago
Alternatives and similar repositories for php-8.1.0-dev-backdoor-rce
Users that are interested in php-8.1.0-dev-backdoor-rce are comparing it to the libraries listed below
Sorting:
- Transition form local file inclusion attacks to remote code exection☆64Updated 4 years ago
- SSTI Payload Generator☆91Updated 2 years ago
- ☆48Updated last year
- OpenSSH 2.3 < 7.7 - Username Enumeration☆42Updated last year
- Simple HTTP listener for security testing☆116Updated 8 months ago
- ImageMagick LFI PoC [CVE-2022-44268]☆52Updated last year
- A wordlist repository with human-curated and reviewed content.☆113Updated last year
- several list of simple and obfuscate PHP shell☆178Updated 2 years ago
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆108Updated last year
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆87Updated last year
- ☆38Updated 2 years ago
- CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆65Updated 3 years ago
- OSCP preperation and HackTheBox write ups.☆60Updated 2 years ago
- XSS Bypass☆30Updated last year
- Aspx reverse shell☆112Updated 5 years ago
- Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773☆109Updated 3 years ago
- Web Application Security Testing Tools☆245Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆94Updated last year
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆250Updated 11 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆157Updated last week
- A couple of different scripts, made to automate attacks against NoSQL databases.☆65Updated last year
- Root shell PoC for CVE-2021-3156☆69Updated 4 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- ☆66Updated 3 years ago
- ☆109Updated 2 years ago
- brute-forcing su for fun and possibly profit☆95Updated 6 years ago
- Abertay CMP202 Project☆34Updated 4 years ago
- ☆61Updated 3 years ago
- Writeups for vulnerable machines.☆175Updated 2 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆210Updated last year