flast101 / php-8.1.0-dev-backdoor-rceLinks
PHP 8.1.0-dev Backdoor System Shell Script
☆94Updated 4 years ago
Alternatives and similar repositories for php-8.1.0-dev-backdoor-rce
Users that are interested in php-8.1.0-dev-backdoor-rce are comparing it to the libraries listed below
Sorting:
- Transition form local file inclusion attacks to remote code exection☆67Updated 5 years ago
- A wordlist repository with human-curated and reviewed content.☆122Updated 2 years ago
- Simple HTTP listener for security testing☆121Updated last year
- ☆54Updated last year
- SSTI Payload Generator☆92Updated 3 years ago
- XSS Bypass☆30Updated last year
- several list of simple and obfuscate PHP shell☆192Updated 3 years ago
- ImageMagick LFI PoC [CVE-2022-44268]☆52Updated 2 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆92Updated 2 years ago
- OSCP preperation and HackTheBox write ups.☆60Updated 2 years ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆257Updated last year
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆111Updated last year
- OpenSSH 2.3 < 7.7 - Username Enumeration☆43Updated 2 years ago
- CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆67Updated 3 years ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆144Updated last week
- Web Application Security Testing Tools☆251Updated last year
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆209Updated last year
- ☆39Updated 2 years ago
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆164Updated last year
- ☆160Updated 4 years ago
- Apache Tomcat exploit and Pentesting guide for penetration tester☆66Updated 3 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆226Updated last year
- Describe how to use ffuf different options with examples☆90Updated 3 years ago
- Local File Inclusion discovery and exploitation tool☆333Updated last year
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 5 months ago
- Aspx reverse shell☆119Updated 6 years ago
- ☆51Updated 3 years ago
- Tool to create XSS PDF files☆67Updated last year
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated 2 years ago