A collection of advanced PHP and ASPX web shells designed to bypass security measures.
☆60Feb 16, 2026Updated 2 weeks ago
Alternatives and similar repositories for Webshell-bypass
Users that are interested in Webshell-bypass are comparing it to the libraries listed below
Sorting:
- xxl_job_executor_默认Access_Token_不出网综合利用☆40Oct 20, 2025Updated 4 months ago
- Aizawa is a command-line webshell designed to execute commands through HTTP header☆67Nov 23, 2025Updated 3 months ago
- Mihomo任意文件写,可通过写SSH密钥、cron任务等实现RCE☆13May 21, 2025Updated 9 months ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Jan 23, 2024Updated 2 years ago
- A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)☆28Mar 16, 2024Updated last year
- c3p0 new gadget☆28Apr 1, 2025Updated 11 months ago
- The Best DDoS Attack Tool + Bypass Cloud Flare CDN For Priv8☆19Oct 14, 2025Updated 4 months ago
- Brute forcing login pages with SQL Injection queries with cURL☆20Nov 9, 2023Updated 2 years ago
- 编码解码工具☆21Jan 7, 2025Updated last year
- gh0str3con is a All in one cloud based web Recon tool.☆23Jul 8, 2024Updated last year
- Jasmin ransomware web panel path traversal PoC☆21Apr 9, 2024Updated last year
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆26May 22, 2023Updated 2 years ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆29Mar 16, 2024Updated last year
- Tutorial Seputar Depes Dan Web Hacking☆37Jun 26, 2022Updated 3 years ago
- ☆40Sep 8, 2025Updated 5 months ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆61May 3, 2024Updated last year
- JSPHorse Project Backup☆27Jan 17, 2022Updated 4 years ago
- Your eyes on the target - SPY☆25Jul 24, 2020Updated 5 years ago
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆29Aug 24, 2024Updated last year
- WordPress WP_Query SQL Injection POC☆28Mar 11, 2023Updated 2 years ago
- ☆32May 27, 2024Updated last year
- Block Windows Defender by deny ACL☆77Jan 12, 2026Updated last month
- CHAOS RAT web panel path RCE PoC☆30Apr 15, 2024Updated last year
- NodeJS File Write to RCE on a read-only filesystem using a ROP chain in libuv☆38Oct 13, 2024Updated last year
- PoC. Severity critical.☆71Aug 12, 2024Updated last year
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆79Updated this week
- ☆28Sep 10, 2022Updated 3 years ago
- MDPin is a server and a website. It contains an UI to fake a Android login screen to steal their pin code. It works via a web browser, by…☆43Mar 9, 2021Updated 4 years ago
- ☆10Jul 16, 2024Updated last year
- Script Deface Keren Dan Berkelas☆10Jun 26, 2022Updated 3 years ago
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Jan 1, 2025Updated last year
- RDL的堆溢出导致的RCE☆223Aug 14, 2024Updated last year
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆36Jun 24, 2023Updated 2 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Jan 4, 2023Updated 3 years ago
- Exploit for CVE-2023-3460. Unauthorized admin access for Ultimate Member plugin < v2.6.7☆35Jul 5, 2023Updated 2 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- AES-encrypted TCP/IP swiss army knife.☆11Nov 6, 2022Updated 3 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago