View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update | 
|---|---|---|---|---|---|
| 0006220 | Kali Linux | Queued Tool Addition | public | 2020-03-24 13:02 | 2022-06-03 08:28 | 
| Reporter | g0tmi1k | Assigned To | sbrun | ||
| Priority | normal | Severity | minor | Reproducibility | have not tried | 
| Status | resolved | Resolution | fixed | ||
| Fixed in Version | 2022.3 | ||||
| Summary | 0006220: phpsploit - Stealth post-exploitation framework | ||||
| Description | [Name] - phpsploit [Version] - v3.0 [Homepage] - https://github.com/nil0x42/phpsploit [Download] - https://github.com/nil0x42/phpsploit/releases [Author] - nil0x42 [License] - GNU General Public License v3.0 ~ https://github.com/nil0x42/phpsploit/blob/master/LICENSE [Description] - Stealth post-exploitation framework PhpSploit: Furtive post-exploitation framework The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor: <?php @eval($_SERVER['HTTP_PHPSPL01T']); ?> [Dependencies] - Python3, pygments, PySock, pyparsing, phpserialize [Activity] - Jul 8, 2012 ~ 26 Dec 2019  | ||||
| Date Modified | Username | Field | Change | 
|---|---|---|---|
| 2020-03-24 13:02 | g0tmi1k | New Issue | |
| 2020-03-24 13:02 | g0tmi1k | Status | new => acknowledged | 
| 2020-03-24 13:02 | g0tmi1k | Category | New Tool Requests => Queued Tool Addition | 
| 2022-04-19 12:51 | sbrun | Assigned To | => sbrun | 
| 2022-04-19 12:51 | sbrun | Status | acknowledged => assigned | 
| 2022-05-04 12:53 | g0tmi1k | Status | assigned => acknowledged | 
| 2022-06-03 08:28 | sbrun | Status | acknowledged => resolved | 
| 2022-06-03 08:28 | sbrun | Resolution | open => fixed | 
| 2022-06-03 08:28 | sbrun | Fixed in Version | => 2022.3 | 
| 2022-06-03 08:28 | sbrun | Note Added: 0016226 |