# phpsploit **Repository Path**: kn1fes/phpsploit ## Basic Information - **Project Name**: phpsploit - **Description**: Stealth post-exploitation framework - **Primary Language**: Unknown - **License**: GPL-3.0 - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2021-04-14 - **Last Updated**: 2021-04-14 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README ### PhpSploit: _Furtive post-exploitation framework_ PhpSploit is a **remote control** framework, aiming to provide a **stealth** interactive shell-like connection over HTTP between client and web server. It is a post-exploitation tool capable to maintain access to a compromised web server for **privilege escalation** purposes. [![travis build](https://travis-ci.org/nil0x42/phpsploit.svg?branch=master)](https://travis-ci.org/nil0x42/phpsploit) [![codacy code quality](https://api.codacy.com/project/badge/Grade/b998fe23c25f40a78c6c35c722bb9fa0)](https://app.codacy.com/app/nil0x42/phpsploit?utm_source=github.com&utm_medium=referral&utm_content=nil0x42/phpsploit&utm_campaign=Badge_Grade_Dashboard) [![lgtm alerts](https://img.shields.io/lgtm/alerts/g/nil0x42/phpsploit.svg?logo=lgtm&logoWidth=18)](https://lgtm.com/projects/g/nil0x42/phpsploit/alerts/) [![codecov coverage](https://codecov.io/gh/nil0x42/phpsploit/branch/master/graph/badge.svg)](https://codecov.io/gh/nil0x42/phpsploit) [![codeclimate maintainability](https://api.codeclimate.com/v1/badges/6986200c1729b4a70a40/maintainability)](https://codeclimate.com/github/nil0x42/phpsploit/maintainability) [![license](https://img.shields.io/github/license/nil0x42/phpsploit.svg)](https://github.com/nil0x42/phpsploit/blob/master/LICENSE) [![requires.io requirements](https://requires.io/github/nil0x42/phpsploit/requirements.svg?branch=master)](https://requires.io/github/nil0x42/phpsploit/requirements/?branch=master) ![phpsploit demo](data/img/phpsploit-demo.png) * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * #### Overview The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny **polymorphic backdoor**: ```php ``` * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * #### Quick Start ```sh git clone https://github.com/nil0x42/phpsploit cd phpsploit/ pip3 install -r requirements.txt ./phpsploit --interactive --eval "help help" ``` * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * #### Features - **Efficient**: More than 20 plugins to automate post-exploitation tasks - Run commands and browse filesystem, bypassing PHP security restrictions - Upload/Download files between client and target - Edit remote files through local text editor - Run SQL console on target system - Spawn reverse TCP shells - **Stealth**: The framework is made by paranoids, for paranoids - Nearly invisible by log analysis and NIDS signature detection - Safe-mode and common _PHP security restrictions bypass_ - Communications are hidden in HTTP Headers - Loaded payloads are obfuscated to _bypass NIDS_ - http/https/socks4/socks5 **Proxy support** - **Convenient**: A robust interface with many crucial features - Detailed help for any command or option (type `help`) - _Cross-platform_ on both the client and the server. - Powerful interface with completion and multi-command support - Session saving/loading feature & persistent history - Multi-request support for large payloads (such as uploads) - Provides a powerful, highly configurable settings engine - Each setting, such as user-agent has a _polymorphic mode_ - Customisable environment variables for plugin interaction - Provides a complete plugin development API * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * #### Supported platforms (as attacker): - GNU/Linux - Mac OS X #### Supported platforms (as target): - GNU/Linux - BSD Like - Mac OS X - Windows NT ## Contributors Thanks goes to these people ([emoji key](https://github.com/all-contributors/all-contributors#emoji-key)): | [nil0x42
nil0x42](https://exdemia.com)
[💻](https://github.com/nil0x42/phpsploit/commits?author=nil0x42 "Code") [🚇](#infra-nil0x42 "Infrastructure (Hosting, Build-Tools, etc)") [🔌](#plugin-nil0x42 "Plugin/utility libraries") [⚠️](https://github.com/nil0x42/phpsploit/commits?author=nil0x42 "Tests") | [shiney-wh
shiney-wh](https://github.com/shiney-wh)
[💻](https://github.com/nil0x42/phpsploit/commits?author=shiney-wh "Code") [🔌](#plugin-shiney-wh "Plugin/utility libraries") | [Wannes Rombouts
Wannes Rombouts](http://wapiflapi.github.io)
[💻](https://github.com/nil0x42/phpsploit/commits?author=wapiflapi "Code") [🚧](#maintenance-wapiflapi "Maintenance") | [Amine Ben Asker
Amine Ben Asker](http://yurilz.com)
[💻](https://github.com/nil0x42/phpsploit/commits?author=yurilaaziz "Code") [🚧](#maintenance-yurilaaziz "Maintenance") | [jose nazario
jose nazario](http://twitter.com/jnazario)
[📖](https://github.com/nil0x42/phpsploit/commits?author=paralax "Documentation") [🐛](https://github.com/nil0x42/phpsploit/issues?q=author%3Aparalax "Bug reports") | [Sujit Ghosal
Sujit Ghosal](http://wikisecure.net)
[📝](#blog-sujit "Blogposts") | [Zerdoumi
Zerdoumi](https://github.com/sohelzerdoumi)
[🐛](https://github.com/nil0x42/phpsploit/issues?q=author%3Asohelzerdoumi "Bug reports") | | :---: | :---: | :---: | :---: | :---: | :---: | :---: | | [tristandostaler
tristandostaler](https://github.com/tristandostaler)
[🐛](https://github.com/nil0x42/phpsploit/issues?q=author%3Atristandostaler "Bug reports") | [Rohan Tarai
Rohan Tarai](https://github.com/rohantarai)
[🐛](https://github.com/nil0x42/phpsploit/issues?q=author%3Arohantarai "Bug reports") | _This project follows the [all-contributors](https://github.com/all-contributors/all-contributors) specification. Contributions of any kind welcome!_