This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this script to somewhere in the web root then run it by accessing the appropriate URL in your browser. The script will open an outbound TCP connection from the webserver to a host and port of your choice. Bound to…
☆23Aug 6, 2024Updated last year
Alternatives and similar repositories for Php-Reverse-Shell
Users that are interested in Php-Reverse-Shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- wp-file-manager 6.7 (Aug 2020) Wordpress Plugin 0day - Remote Code Execution☆75Oct 9, 2020Updated 5 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- PEDA - Python Exploit Development Assistance for GDB☆24Aug 6, 2025Updated 8 months ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts☆17Oct 23, 2019Updated 6 years ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- ☆25Mar 21, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 11 months ago
- Human Oriented SHell☆30Updated this week
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated 3 weeks ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- Nethunter Kernel for the OnePlus 3 / 3T - Ten☆12May 9, 2023Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 5 years ago
- Canva-like Editor (Polotno) in Next.js with DALLE2 (OpenAI)☆15May 22, 2023Updated 2 years ago
- Smart Content Management System using Spring Boot☆17Mar 18, 2026Updated 3 weeks ago
- Unicode encoding attacks with machine learning☆97Nov 25, 2021Updated 4 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- ☆12Aug 11, 2024Updated last year
- Windows Privilege Escalation☆30Aug 14, 2020Updated 5 years ago
- Simple Resume Builder with PDF renderer☆14Jan 24, 2022Updated 4 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- Bare Bones Banking malware coded for research & educational purposes☆87Aug 24, 2020Updated 5 years ago
- Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED☆17Nov 27, 2023Updated 2 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Pollard-Rho-kangaroo solved cuda☆14Oct 9, 2019Updated 6 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- Send anonymous text messages with TOR and the TextBelt API☆69Jun 19, 2021Updated 4 years ago