Simple PHP webshell with a JPEG header to bypass weak image verification checks
☆68Apr 16, 2015Updated 10 years ago
Alternatives and similar repositories for php-jpeg-shell
Users that are interested in php-jpeg-shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CTF Team -TeamRocketIST's website source code.☆17Aug 21, 2023Updated 2 years ago
- A Better Way to Direct Google Drive Video☆17Nov 1, 2018Updated 7 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29May 7, 2017Updated 8 years ago
- Web shell/backdoor written in php for web exploitation☆12Oct 12, 2021Updated 4 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- WordPress <= 5.3.? DoS☆24Dec 17, 2019Updated 6 years ago
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆40Dec 12, 2018Updated 7 years ago
- ☆16Dec 2, 2019Updated 6 years ago
- ☆12Nov 19, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- ☆16Jun 23, 2024Updated last year
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆126Feb 20, 2023Updated 3 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- ios source grepper☆42May 4, 2017Updated 8 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Source code for the article "A bug story: data alignment on x86"☆17Nov 6, 2016Updated 9 years ago
- MODBUS Penetration Testing Framework☆12Jul 2, 2017Updated 8 years ago
- I agree with mass surveillance, but not government corruption. This is the result.☆11Jun 20, 2020Updated 5 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- ☆16Jun 16, 2021Updated 4 years ago
- Daily TLD health report generated using RIPE's DNSCheck against all existing TLDs.☆18Jan 25, 2017Updated 9 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆35Jan 13, 2023Updated 3 years ago
- Tools and library to manipulate EFI variables.☆10Mar 17, 2026Updated last week
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- WordPress auto exploit☆29Dec 28, 2017Updated 8 years ago
- ☆46Dec 30, 2018Updated 7 years ago
- Browser based rce for iOS <= 14.3☆10May 26, 2025Updated 9 months ago
- Exploit for CVE-2018-7600.. called drupalgeddon2,☆11Apr 19, 2018Updated 7 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- Stargate☆96Aug 6, 2016Updated 9 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated 2 years ago