# phpsploit
**Repository Path**: kn1fes/phpsploit
## Basic Information
- **Project Name**: phpsploit
- **Description**: Stealth post-exploitation framework
- **Primary Language**: Unknown
- **License**: GPL-3.0
- **Default Branch**: master
- **Homepage**: None
- **GVP Project**: No
## Statistics
- **Stars**: 0
- **Forks**: 0
- **Created**: 2021-04-14
- **Last Updated**: 2021-04-14
## Categories & Tags
**Categories**: Uncategorized
**Tags**: None
## README
### PhpSploit: _Furtive post-exploitation framework_
PhpSploit is a **remote control** framework, aiming to provide a **stealth**
interactive shell-like connection over HTTP between client and web server.
It is a post-exploitation tool capable to maintain access to a
compromised web server for **privilege escalation** purposes.
[](https://travis-ci.org/nil0x42/phpsploit)
[](https://app.codacy.com/app/nil0x42/phpsploit?utm_source=github.com&utm_medium=referral&utm_content=nil0x42/phpsploit&utm_campaign=Badge_Grade_Dashboard)
[](https://lgtm.com/projects/g/nil0x42/phpsploit/alerts/)
[](https://codecov.io/gh/nil0x42/phpsploit)
[](https://codeclimate.com/github/nil0x42/phpsploit/maintainability)
[](https://github.com/nil0x42/phpsploit/blob/master/LICENSE)
[](https://requires.io/github/nil0x42/phpsploit/requirements/?branch=master)

* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
#### Overview
The obfuscated communication is accomplished using HTTP headers under
standard client requests and web server's relative responses, tunneled
through a tiny **polymorphic backdoor**:
```php
```
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
#### Quick Start
```sh
git clone https://github.com/nil0x42/phpsploit
cd phpsploit/
pip3 install -r requirements.txt
./phpsploit --interactive --eval "help help"
```
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
#### Features
- **Efficient**: More than 20 plugins to automate post-exploitation tasks
- Run commands and browse filesystem, bypassing PHP security restrictions
- Upload/Download files between client and target
- Edit remote files through local text editor
- Run SQL console on target system
- Spawn reverse TCP shells
- **Stealth**: The framework is made by paranoids, for paranoids
- Nearly invisible by log analysis and NIDS signature detection
- Safe-mode and common _PHP security restrictions bypass_
- Communications are hidden in HTTP Headers
- Loaded payloads are obfuscated to _bypass NIDS_
- http/https/socks4/socks5 **Proxy support**
- **Convenient**: A robust interface with many crucial features
- Detailed help for any command or option (type `help`)
- _Cross-platform_ on both the client and the server.
- Powerful interface with completion and multi-command support
- Session saving/loading feature & persistent history
- Multi-request support for large payloads (such as uploads)
- Provides a powerful, highly configurable settings engine
- Each setting, such as user-agent has a _polymorphic mode_
- Customisable environment variables for plugin interaction
- Provides a complete plugin development API
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
#### Supported platforms (as attacker):
- GNU/Linux
- Mac OS X
#### Supported platforms (as target):
- GNU/Linux
- BSD Like
- Mac OS X
- Windows NT
## Contributors
Thanks goes to these people ([emoji key](https://github.com/all-contributors/all-contributors#emoji-key)):
| [
nil0x42](https://exdemia.com)
[💻](https://github.com/nil0x42/phpsploit/commits?author=nil0x42 "Code") [🚇](#infra-nil0x42 "Infrastructure (Hosting, Build-Tools, etc)") [🔌](#plugin-nil0x42 "Plugin/utility libraries") [⚠️](https://github.com/nil0x42/phpsploit/commits?author=nil0x42 "Tests") | [
shiney-wh](https://github.com/shiney-wh)
[💻](https://github.com/nil0x42/phpsploit/commits?author=shiney-wh "Code") [🔌](#plugin-shiney-wh "Plugin/utility libraries") | [
Wannes Rombouts](http://wapiflapi.github.io)
[💻](https://github.com/nil0x42/phpsploit/commits?author=wapiflapi "Code") [🚧](#maintenance-wapiflapi "Maintenance") | [
Amine Ben Asker](http://yurilz.com)
[💻](https://github.com/nil0x42/phpsploit/commits?author=yurilaaziz "Code") [🚧](#maintenance-yurilaaziz "Maintenance") | [
jose nazario](http://twitter.com/jnazario)
[📖](https://github.com/nil0x42/phpsploit/commits?author=paralax "Documentation") [🐛](https://github.com/nil0x42/phpsploit/issues?q=author%3Aparalax "Bug reports") | [
Sujit Ghosal](http://wikisecure.net)
[📝](#blog-sujit "Blogposts") | [
Zerdoumi](https://github.com/sohelzerdoumi)
[🐛](https://github.com/nil0x42/phpsploit/issues?q=author%3Asohelzerdoumi "Bug reports") |
| :---: | :---: | :---: | :---: | :---: | :---: | :---: |
| [
tristandostaler](https://github.com/tristandostaler)
[🐛](https://github.com/nil0x42/phpsploit/issues?q=author%3Atristandostaler "Bug reports") | [
Rohan Tarai](https://github.com/rohantarai)
[🐛](https://github.com/nil0x42/phpsploit/issues?q=author%3Arohantarai "Bug reports") |
_This project follows the [all-contributors](https://github.com/all-contributors/all-contributors) specification. Contributions of any kind welcome!_