These are simple WebDAV-based exploits created to avoid the use of Metasploit and Meterpreter shells.
They were developed during OSCP preparation and tested against targets in OffSec labs, VHL, VulnHub, and similar environments.
The goal of these tools is to explore alternative post-exploitation methods in constrained environments, or in labs where Metasploit is discouraged or restricted.
- Uploads a PHP reverse shell for Windows
- Establishes a basic shell back to the attacker's machine
- Useful when a remote shell is achievable via HTTP PUT
Includes a PHP payload adapted for reverse connectivity.
- Drops a CMD backdoor on the target
- No automatic shell; useful in cases where reverse shells are unstable or blocked
- Ideal fallback when the target is partially responsive
These scripts are provided for educational and authorized testing purposes only.
Do not use these tools on any system unless you have explicit permission to do so.
Unauthorized use is illegal and unethical.
- OSCP or CTF-style environments
- Situations with no Metasploit allowance
- Learning custom shell delivery or backdoor placement