This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat or msvenom payload for further access to the target.
☆22Jan 6, 2026Updated 3 months ago
Alternatives and similar repositories for The-Not-So-Simple-PHP-Command-Shell
Users that are interested in The-Not-So-Simple-PHP-Command-Shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆22Mar 26, 2026Updated 2 weeks ago
- Unified repository for different Metasploit Framework payloads☆16Apr 3, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Apr 17, 2022Updated 3 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Aug 5, 2022Updated 3 years ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆24Apr 20, 2022Updated 3 years ago
- Cross-platform RAT, written in C☆88Oct 8, 2022Updated 3 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆49Jul 18, 2024Updated last year
- Another vulnerability scanner☆18Aug 9, 2025Updated 8 months ago
- 用于内网渗透测试的工具包括 crto 认证、AD 渗透以及内网信息收集项目的自存☆18May 31, 2024Updated last year
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆58Dec 17, 2024Updated last year
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 6 months ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Dec 26, 2022Updated 3 years ago
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- A wacky exploitation framework written in pure python3.☆22Mar 24, 2024Updated 2 years ago
- DarkComet☆13Nov 13, 2022Updated 3 years ago
- ☆23Apr 21, 2022Updated 3 years ago
- IRC botnet, that's mainly used to launch denial-of-service attacks.☆31Jan 19, 2024Updated 2 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆34Apr 9, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Dompdf RCE PoC Exploit - CVE-2022-28368☆16Jan 19, 2024Updated 2 years ago
- SVG, XML, GIF and PDF files that result in finding XSS reports on websites : The payloads are available for testing purpose only.☆15Apr 17, 2023Updated 2 years ago
- A script for automatize boolean-based blind SQL injections (MVP).☆54Aug 29, 2022Updated 3 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- spring4shell | CVE-2022-22965☆23Jun 30, 2022Updated 3 years ago
- Simple Unity ECS framework that supports all the basics of an RPG☆14Jun 23, 2020Updated 5 years ago
- CVE-2022-1292 OpenSSL c_rehash Vulnerability - POC☆28Jul 20, 2022Updated 3 years ago
- delosNmap | Nmap Script☆39Jan 15, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated last year
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 9 months ago
- a proof of stake meme coin with a programmable blockchain written entirely in rust☆10Feb 13, 2026Updated last month
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- ☆11Nov 28, 2019Updated 6 years ago
- ☆29May 19, 2023Updated 2 years ago