g0tmi1k / php-backdoorLinks
A standalone PHP backdoor for use on *nix and Windows systems.
☆8Updated 11 years ago
Alternatives and similar repositories for php-backdoor
Users that are interested in php-backdoor are comparing it to the libraries listed below
Sorting:
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- Custom stagers with python encrypting proxy☆39Updated 10 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- A scripted library of hacking techniques.☆18Updated 6 years ago
- Advanced XPath Injection Tool☆34Updated 10 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Issues to consider when planning a red team exercise.☆15Updated 7 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Plugin for keepnote to import a XML nmap file☆27Updated 8 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 9 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Collection of tools for privesc on Linux☆34Updated 11 years ago
- BurpJDSer-ng☆28Updated last week
- Weape-Wireless-EAP-Extractor☆29Updated 11 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Updated 11 years ago