<div style="margin:20px 0 0 200px"> To view the site, enable JavaScript by changing your browser options, then <a href="">Try Again</a>.</div>

PhpSploit - Stealth Post-Exploitation Framework

PhpSploit - Stealth Post-Exploitation Framework

PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server. It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes.

Features:

Efficient: More than 20 plugins to automate post-exploitation tasks
  1. Run commands and browse filesystem, bypassing PHP security restrictions
  2. Upload/Download files between client and target
  3. Edit remote files through local text editor
  4. Run SQL console on target system
  5. Spawn reverse TCP shells

Download: https://github.com/nil0x42/phpsploit

Other Hacking Tools

Explore All Hacking Tools »
UFTP - UDP based FTP with encryption
UFTP - UDP based FTP with encryption
Read Details »
Executable Compression demystified
Executable Compression demystified
Read Details »
BitCracker – Password Cracking Tool
BitCracker – Password Cracking Tool
Read Details »
BloodHound – Red / Blue teaming tool for AD attacks
BloodHound – Red / Blue teaming tool for AD attacks
Read Details »

Research Articles

Read All Research Articles »
Cyber Criminals are turning into Cryptominers, Dominating Cyber Threat Landscape
Cyber Criminals are turning into Cryptominers, Dominating Cyber Threat Landscape

According to Check Point, during the period July to December 2017, one in five Organizations are affected by crypto mining malware, tools that enable cybercriminals to hijack the victim's CPU or GPU power and existing resources to mine cryptocurrency, using as much as 65% of the end-users CPU power.

Read Details

Breaking News

Breaking News Of Each Month »
85 password stealing apps found on Google Playstore
85 password stealing apps found on Google Playstore

Security researchers discovered malicious apps designed to steal credentials from users have been downloaded million times from Google play store. Among these, the most popular app is a gaming app.

Read Details