Skip to content

andknownmaly/ShellPhant0m

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 

Repository files navigation

ShellPhant0m

ShellPhant0m is a lightweight PHP webshell with a built-in reverse shell launcher. It provides an interactive dropdown interface to trigger reverse connections using either Netcat or Socat, directly from the web interface.

image

Features

  • Single-file PHP shell for remote deployment
  • Supports both Netcat and Socat reverse shell connections
  • Accepts Ngrok or TCP address directly
  • Auto-parses the host and port
  • Displays listener command to be run on attacker's machine

Requirements

  • PHP-enabled web server (e.g., Apache, Nginx with PHP)
  • A public listener (Ngrok, VPS, port-forwarded server)

Usage

  1. Upload ShellPhant0m.php to the target server.
  2. Access the shell via browser.
  3. Choose either Netcat or Socat from the dropdown menu.
  4. Paste your Ngrok or TCP address (e.g., 0.tcp.ap.ngrok.io:12345).
  5. Click Connect to trigger the reverse shell.

Example Ngrok Setup

ngrok tcp 4444

Paste the generated address (e.g., 0.tcp.ap.ngrok.io:12345) into PhantomShell.

Example Listener (on your machine)

For Netcat:

nc -lvnp 4444

For Socat:

socat -d -d tcp-l:4444,reuseaddr,fork exec:/bin/bash,pty,stderr,setsid,sigint,sane

Disclaimer

This tool is intended for educational and authorized security testing purposes only. Do not use it on systems you do not own or have explicit permission to test.


Anu by : AndKnownMaly

About

PHP webshell with a built-in reverse shell launcher

Topics

Resources

Stars

Watchers

Forks

Languages