{"id":25753966,"url":"https://github.com/rootshelll/attack-shell","last_synced_at":"2026-04-16T02:31:14.757Z","repository":{"id":278589736,"uuid":"936124112","full_name":"RootShelll/Attack-Shell","owner":"RootShelll","description":"Attack Shell (Ani-Shell) is a versatile PHP shell featuring a mass mailer, web-server fuzzer, dosser, back connect, bind shell, auto rooter, and more. Learn how to install, customize, and use this tool effectively.","archived":false,"fork":false,"pushed_at":"2025-02-20T16:13:00.000Z","size":251,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-02-20T16:28:00.716Z","etag":null,"topics":["ani-shell","attack-shell","auto-rooter","back-connect","bind-shell","cybersecurity","docker","dosser","mass-mailer","penetration-testing","php-shell","web-server-fuzzer"],"latest_commit_sha":null,"homepage":"https://r00t-shell.com/attack-shell-ani-shell-advanced-php-shell-for-demonstration-learning/","language":"PHP","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/RootShelll.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2025-02-20T15:10:26.000Z","updated_at":"2025-02-20T16:15:13.000Z","dependencies_parsed_at":"2025-02-20T16:28:05.381Z","dependency_job_id":"48d38f3b-1f27-407e-82af-1be5d45c0dc3","html_url":"https://github.com/RootShelll/Attack-Shell","commit_stats":null,"previous_names":["rootshelll/attack-shell"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/RootShelll/Attack-Shell","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2FAttack-Shell","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2FAttack-Shell/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2FAttack-Shell/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2FAttack-Shell/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/RootShelll","download_url":"https://codeload.github.com/RootShelll/Attack-Shell/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2FAttack-Shell/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":31868487,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-04-15T15:24:51.572Z","status":"online","status_checked_at":"2026-04-16T02:00:06.042Z","response_time":69,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["ani-shell","attack-shell","auto-rooter","back-connect","bind-shell","cybersecurity","docker","dosser","mass-mailer","penetration-testing","php-shell","web-server-fuzzer"],"created_at":"2025-02-26T15:29:53.064Z","updated_at":"2026-04-16T02:31:14.739Z","avatar_url":"https://github.com/RootShelll.png","language":"PHP","readme":"# Attack Shell (Ani-Shell)\n\n![Attack Shell Logo](https://r00t-shell.com/wp-content/uploads/2025/02/Attack-Shell-Ani-Shell.png)\n\n**Version:** v1.0-Alpine (Last updated: February 24, 2017)\n\n**Warning:** This software is intended for demonstration and educational purposes only. Ensure you have the necessary permissions before use, and use it at your own risk.\n\n## Table of Contents\n\n- [Introduction](#introduction)\n- [Features](#features)\n- [Installation and Configuration](#installation-and-configuration)\n  - [Running with Docker](#running-with-docker)\n  - [Configuring with a Custom `php.ini` File](#configuring-with-a-custom-phpini-file)\n- [Customization and Security Settings](#customization-and-security-settings)\n- [Usage Guide](#usage-guide)\n  - [Accessing the Shell](#accessing-the-shell)\n  - [Interface Overview](#interface-overview)\n  - [Using Advanced Features](#using-advanced-features)\n  - [Troubleshooting and Support](#troubleshooting-and-support)\n- [Conclusion](#conclusion)\n\n## Introduction\n\nAttack Shell, also known as Ani-Shell, is a powerful PHP shell equipped with unique features such as mass mailer, web server fuzzer, dosser, back connect, bind shell, and auto rooter. It is designed with open coding standards, making customization straightforward; ideal for both beginners and advanced users interested in cybersecurity and penetration testing.\n\nWhether you're learning the basics of security for the first time or conducting comprehensive tests in your environment, this tool offers a flexible platform for education and experimentation.\n\n## Features\n\n- Interactive PHP shell\n- Intelligent file manager\n- Auto rooter for privilege escalation\n- PHP code obfuscation\n- Mass mailer (for responsible use)\n- Web server fuzzer to identify vulnerabilities\n- Dosser for simulating DoS attacks\n- Bind shell and back connect features\n- Customizable security settings (lock mode, anti-crawler)\n- Email traceback and notifications\n- Mass code injector for adding or modifying code\n- MD5 hash cracker\n- Python bind-shell integration\n\n## Installation and Configuration\n\n### Running with Docker\n\nTo quickly set up Attack Shell, you can use Docker to run it in a local container. Open your terminal and execute the following command:\n\n```bash\ndocker run -d -p 80:80 --name attack-shell R00t-Shelll/attack-shell\n```\n\n\nTo find the container's IP address, run:\n\n```bash\ndocker inspect -f '{{range .NetworkSettings.Networks}}{{.IPAddress}}{{end}}' attack-shell\n```\n\n### Configuring with a Custom `php.ini` File\n\nIf you require custom PHP settings, you can update the Dockerfile as follows:\n\n```dockerfile\nFROM k0st/alpine-apache-php\n\nLABEL maintainer \"your-email@example.com\"\n\n# Set your timezone (e.g., Europe/Istanbul)\nENV TZ=Europe/Istanbul\n\nRUN apk add --update --virtual .build-deps tzdata \u0026\u0026 \\\n  ln -snf /usr/share/zoneinfo/${TZ} /etc/localtime \u0026\u0026 \\\n  echo \"${TZ}\" \u003e /etc/timezone \u0026\u0026 \\\n  apk del .build-deps\n\nCOPY config/php.ini /usr/local/etc/php/\nCOPY . /var/www/html\n```\n\n**Note:** Replace `your-email@example.com` with your email address and ensure the `php.ini` file is correctly configured.\n\n## Customization and Security Settings\n\nAttack Shell comes with the following default settings, which you can modify to suit your needs:\n\n1. **Default Login Credentials:** Username: `admin` and Password: `R00t`. It's crucial to change these immediately after installation.\n2. **Lock Mode:** Enabled by default to prevent unauthorized access. Do not disable unless you are certain your security measures are adequate.\n3. **Anti-Crawler Feature:** Disabled by default. Enable it to block automated bots from accessing the shell.\n4. **Customizable Greeting Messages:** Modify the `greetings` variable to personalize the shell's welcome message.\n\n## Usage Guide\n\n### Accessing the Shell\n\nAfter installation, open your browser and navigate to the IP address or domain where the container is hosted. Log in using the default credentials:\n\n**Warning:** Immediately change the default login credentials to secure your system.\n\n### Interface Overview\n\nUpon logging in, you'll be presented with an intuitive interface that provides access to all features, including the file manager, command execution panel, and various tools.\n\n### Using Advanced Features\n\n- **Mass Mailer:** Send bulk emails responsibly. Ensure you have permission to contact recipients.\n- **Web Server Fuzzer:** Test your server for common vulnerabilities.\n- **Dosser:** Simulate Denial of Service attacks in a controlled environment.\n- **Auto Rooter:** Attempt privilege escalation where applicable.\n- **Bind Shell/Back Connect:** Establish reverse or bind shell connections for remote access.\n\n**Note:** Use these features ethically and only on systems you own or have explicit permission to test.\n\n### Troubleshooting and Support\n\nIf you encounter issues:\n\n- Verify that your server meets the necessary requirements.\n- Ensure all configurations are correct.\n- Consult the [official GitHub repository](https://github.com/RootShelll) for updates and community support.\n\n## Conclusion\n\nAttack Shell offers a comprehensive suite of tools for those interested in cybersecurity and penetration testing. Always use it responsibly, ethically, and within the bounds of the law. \n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Frootshelll%2Fattack-shell","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Frootshelll%2Fattack-shell","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Frootshelll%2Fattack-shell/lists"}