Post Exploitationpost-exploitationframeworkstealthshellhttpprivilege-escalation

phpsploit

Stealth post-exploitation framework providing an interactive shell-like connection over HTTP between client and web server. It maintains access to compromised web servers for privilege escalation.

Description

phpsploit is a remote control framework designed for stealthy post-exploitation on compromised web servers. It establishes an interactive shell-like connection over HTTP, ensuring minimal detection while allowing persistent access.

The tool is particularly useful after initial exploitation of a web application, enabling operators to maintain control and escalate privileges without relying on traditional backdoors that might be easily detected.

It supports session management, configuration customization, and non-interactive command execution, making it versatile for automated or scripted post-exploitation tasks.

How It Works

phpsploit operates by creating a stealthy HTTP-based communication channel between the client and a compromised web server. It leverages PHP on the server side to handle commands and responses, using techniques like HTTP tunneling to mimic legitimate web traffic. Dependencies such as python3-phpserialize enable PHP object serialization/deserialization for command execution, while proxies and socks support evasion through network intermediaries.

Installation

bash
sudo apt install phpsploit

Flags

-h, --helpshow this help message and exit
-v, --versionoutput version information and exit
-c, --config <FILE>use alternative configuration file
-l, --load <SESSION>load session file
-t, --target <URL>set remote TARGET URL
-s, --source <FILE>run commands from file (disables interactive mode)
-e, --eval <CMD>run phpsploit command (disables interactive mode)
-i, --interactiveforce interactive mode if unset by `-e` or `-s`

Examples

Display the help message and usage information
phpsploit -h
Output version information
phpsploit -v
Use an alternative configuration file
phpsploit -c config.ini
Load a saved session file
phpsploit -l session.phpsploit
Set the remote target URL and start interactive session
phpsploit -t http://target.com/shell.php
Run commands from a file in non-interactive mode
phpsploit -s commands.txt
Evaluate a single phpsploit command in non-interactive mode
phpsploit -e 'help'
Force interactive mode with target URL
phpsploit -t http://target.com/shell.php -i
Updated 2026-04-16kali.org ↗