This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this script to somewhere in the web root then run it by accessing the appropriate URL in your browser. The script will open an outbound TCP connection from the webserver to a host and port of your choice. Bound to…
☆23Aug 6, 2024Updated last year
Alternatives and similar repositories for Php-Reverse-Shell
Users that are interested in Php-Reverse-Shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 7 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- wp-file-manager 6.7 (Aug 2020) Wordpress Plugin 0day - Remote Code Execution☆74Oct 9, 2020Updated 5 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 4 years ago
- PEDA - Python Exploit Development Assistance for GDB☆24Aug 6, 2025Updated 9 months ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts☆17Oct 23, 2019Updated 6 years ago
- ☆25Mar 21, 2020Updated 6 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Human Oriented SHell☆31May 13, 2026Updated last week
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago
- Vimana is an experimental security tool that aims to provide resources for auditing Python web applications.☆38Aug 27, 2021Updated 4 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆15Sep 4, 2019Updated 6 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated 2 months ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 5 years ago
- Smart Content Management System using Spring Boot☆17Mar 18, 2026Updated 2 months ago
- Nethunter Kernel for the OnePlus 3 / 3T - Ten☆13May 9, 2023Updated 3 years ago
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆24Jan 13, 2022Updated 4 years ago
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- Windows Privilege Escalation☆30Aug 14, 2020Updated 5 years ago
- This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some custo…☆80Mar 31, 2026Updated last month
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆43Dec 2, 2020Updated 5 years ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Gmail shell, for hackers execute commands via gmail☆20Feb 3, 2021Updated 5 years ago
- Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED☆17Nov 27, 2023Updated 2 years ago
- ☆31Dec 11, 2025Updated 5 months ago
- Pollard-Rho-kangaroo solved cuda☆14Oct 9, 2019Updated 6 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Jun 6, 2025Updated 11 months ago
- ☆11Aug 18, 2023Updated 2 years ago
- Powershell UAC Bypass script leveraging WinSAT.exe☆17Dec 21, 2021Updated 4 years ago