A stealthy command and control framework that persists on webservers via a polymorphic PHP one-liner backdoor.
PhpSploit is a command and control framework used in penetration testing to maintain access to compromised web servers. It deploys a polymorphic PHP one-liner backdoor that communicates stealthily via HTTP headers, allowing security researchers to execute commands, transfer files, and perform post-exploitation tasks while evading detection.
Security researchers, penetration testers, and red team operators who need a stealthy, persistent C2 framework for web server post-exploitation and security assessment.
Developers choose PhpSploit for its exceptional stealth capabilities, polymorphic backdoor design, and comprehensive plugin suite, making it a powerful tool for maintaining access and conducting covert operations on compromised systems.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Over 20 plugins automate tasks like file transfer, SQL console access, and reverse shell spawning, streamlining post-exploitation.
Uses HTTP header communication with payload obfuscation to bypass NIDS and a polymorphic backdoor to evade signature detection, as highlighted in the philosophy.
Includes auto-completion, session management, and a configurable settings engine, making it convenient for experienced operators.
Runs on Linux, Mac OS X, and Windows NT as targets, with client support for Linux and Mac, ensuring flexibility in testing environments.
Limited to servers running PHP, reducing utility in heterogeneous or modern cloud-native environments without PHP.
Requires an existing method to deploy the backdoor, such as file upload vulnerabilities, making it ineffective for initial compromise phases.
Lacks a GUI, which may hinder usability for teams accustomed to visual tools, and the steep learning curve isn't mitigated by beginner-friendly guides.
Compared to frameworks like Metasploit, it has fewer third-party integrations and community-contributed modules, restricting extensibility.