A weaponized PHP web shell for post-exploitation with over 30 modules for remote administration, auditing, and network pivoting.
Weevely is a weaponized web shell used in penetration testing to maintain access and perform post-exploitation activities on compromised web servers. It provides a remote command-line interface and a modular framework with over 30 modules for tasks like file management, security auditing, network pivoting, and privilege escalation. The tool is designed to be stealthy, using an obfuscated PHP agent that evades detection while communicating over HTTP.
Security professionals, penetration testers, and red teamers who need to simulate advanced persistent threats and conduct post-exploitation activities during authorized security assessments.
Developers choose Weevely for its extensive modular framework, stealthy communication protocol, and ability to pivot through networks, making it a comprehensive tool for post-exploitation scenarios beyond basic shell access.
Weaponized web shell
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Includes over 30 modules for diverse tasks like file management, security auditing, and network scanning, as detailed in the modules table, allowing extensibility without external tools.
Uses a polymorphic PHP script with obfuscated HTTP requests to evade detection, as mentioned in the agent description, making it suitable for simulating advanced threats.
Enables proxying HTTP/HTTPS traffic and port scanning through the target, using modules like :net_proxy and :net_scan for deeper network exploration post-compromise.
Supports upload, download, editing, and management of files with modules such as :file_upload and :file_edit, streamlining post-exploitation data handling.
Restricted to web servers with PHP support, as the agent is a PHP script, making it ineffective for non-PHP environments like static sites or other server stacks.
Installation requires following external wiki pages for dependencies and usage, and the modular framework demands expertise to leverage fully, which can be daunting for newcomers.
Operates solely via command-line, which may hinder users accustomed to GUI-based security tools for visual feedback and easier navigation during assessments.