This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this script to somewhere in the web root then run it by accessing the appropriate URL in your browser. The script will open an outbound TCP connection from the webserver to a host and port of your choice. Bound to…
☆23Aug 6, 2024Updated last year
Alternatives and similar repositories for Php-Reverse-Shell
Users that are interested in Php-Reverse-Shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- ☆25Aug 19, 2024Updated last year
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- wp-file-manager 6.7 (Aug 2020) Wordpress Plugin 0day - Remote Code Execution☆75Oct 9, 2020Updated 5 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 4 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Automated Script For Hacking Into CAN Bus - Car Hacking☆141Sep 10, 2021Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆73Jan 6, 2022Updated 4 years ago
- ☆25Mar 21, 2020Updated 6 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 11 months ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Human Oriented SHell☆30Updated this week
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago
- Working reverse-engineered Claude Code CLI rebuilt from source analysis to reproduce the original terminal workflow☆103Apr 18, 2026Updated last week
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- A lightweight and simple directory buster.☆16Sep 9, 2023Updated 2 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 5 years ago
- Smart Content Management System using Spring Boot☆17Mar 18, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Unicode encoding attacks with machine learning☆97Nov 25, 2021Updated 4 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Nethunter Kernel for the OnePlus 3 / 3T - Ten☆13May 9, 2023Updated 2 years ago
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- Windows Privilege Escalation☆30Aug 14, 2020Updated 5 years ago
- This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some custo…☆75Mar 31, 2026Updated 3 weeks ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- Bare Bones Banking malware coded for research & educational purposes☆87Aug 24, 2020Updated 5 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Jun 6, 2025Updated 10 months ago
- ☆11Aug 18, 2023Updated 2 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 3 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- Open source Java Card applet that allows you to unlock, start, or lock a Tesla Model 3 just like the official key card☆15Oct 19, 2025Updated 6 months ago
- Anti-hacking tools deploying configuration for Wordpress☆13May 27, 2020Updated 5 years ago