{"id":25753962,"url":"https://github.com/rootshelll/bheh_php_shell","last_synced_at":"2025-08-09T14:06:13.752Z","repository":{"id":278413903,"uuid":"935542854","full_name":"RootShelll/BHEH_PHP_SHELL","owner":"RootShelll","description":"Discover BHEH_PHP_SHELL, the Black Hat Ethical Hacking PHP Backdoor Shell v1.0, a custom PHP web shell for penetration testing. Learn how to deploy and use this tool responsibly for post-exploitation tasks.","archived":false,"fork":false,"pushed_at":"2025-02-19T16:10:58.000Z","size":182,"stargazers_count":2,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-06-11T02:50:12.084Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"PHP","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/RootShelll.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2025-02-19T16:05:27.000Z","updated_at":"2025-03-05T11:11:19.000Z","dependencies_parsed_at":"2025-02-19T17:33:34.555Z","dependency_job_id":null,"html_url":"https://github.com/RootShelll/BHEH_PHP_SHELL","commit_stats":null,"previous_names":["rootshelll/bheh_php_shell"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/RootShelll/BHEH_PHP_SHELL","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2FBHEH_PHP_SHELL","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2FBHEH_PHP_SHELL/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2FBHEH_PHP_SHELL/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2FBHEH_PHP_SHELL/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/RootShelll","download_url":"https://codeload.github.com/RootShelll/BHEH_PHP_SHELL/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2FBHEH_PHP_SHELL/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":269586128,"owners_count":24442505,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-08-09T02:00:10.424Z","response_time":111,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2025-02-26T15:29:52.914Z","updated_at":"2025-08-09T14:06:13.711Z","avatar_url":"https://github.com/RootShelll.png","language":"PHP","readme":"# BHEH_PHP_SHELL - Black Hat Ethical Hacking PHP Backdoor Shell v1.0\n\n![BHEH_PHP_SHELL Logo](https://r00t-shell.com/wp-content/uploads/2025/02/BHEH_PHP_SHELL.png)\n\n## Overview\n\n**BHEH_PHP_SHELL** is a PHP web shell designed specifically for penetration testing. It provides security professionals with a quick and effective set of tools for post-exploitation tasks after gaining access to a vulnerable web server.\n\nRemember: this tool is intended for legitimate, ethical, and educational use only. Unauthorized access or use is illegal and unethical.\n\n## Key Features of BHEH_PHP_SHELL\n\n- Lightweight and easy-to-deploy PHP shell interface\n- Remote execution of system commands\n- File and directory management on the target server\n- Efficient post-exploitation capabilities\n- Fully customizable for various penetration testing scenarios\n\n## Installation and Usage Guide\n\n### Step 1: Upload the Shell\n\nUse a file upload vulnerability or a secure file transfer method to upload the `bheh_shell.php` file (which contains **BHEH_PHP_SHELL**) to the target web server.\n\n### Step 2: Access the Shell Interface\n\nOnce uploaded successfully, open your web browser and navigate to the location where **BHEH_PHP_SHELL** is hosted. For example:\n\n\n\nhttp://targetsite.com/path/to/bheh_shell.php\n\n\n### Step 3: Interact with BHEH_PHP_SHELL\n\nThe web interface provides various functions, such as:\n\n- Executing system commands (e.g., `ls -la`, `whoami`, `uname -a`)\n- Browsing, uploading, and downloading files\n- Gathering system information and performing privilege escalation tests\n\nFor example, to list files in the current directory, simply type:\n\n\n\nls -la\n\n\nExperiment with the interface and its commands carefully. Always document your actions during testing.\n\n## Warnings and Important Notices\n\n\u003e **Warning:** **BHEH_PHP_SHELL** is for educational purposes and authorized security testing only. Unauthorized use may result in serious legal consequences.\n\n\u003e **Note:** Always ensure you have explicit written permission from the system owner before starting any penetration testing using **BHEH_PHP_SHELL**.\n\n## Detailed Beginner's Guide\n\n1. **Understanding BHEH_PHP_SHELL:** Familiarize yourself with the basics of PHP, web servers, and file upload vulnerabilities. **BHEH_PHP_SHELL** is a PHP script that allows remote execution of commands on the server.\n   \n2. **Setting Up Your Environment:** Prepare a controlled lab environment or use a virtual machine where you have permission to test.\n\n3. **Uploading the Shell:** Use an exploitable upload form or FTP access to place the `bheh_shell.php` file (the core of **BHEH_PHP_SHELL**) on your testing server.\n\n4. **Running Commands:** Access the shell through your browser and try basic commands like `whoami` or `uname -a` to understand its functionality.\n\n5. **File and Directory Management:** Navigate directories, read file contents, and manage files on the server using **BHEH_PHP_SHELL**.\n\n6. **Post-Exploitation Techniques:** Use the shell for further assessments and, if necessary, privilege escalation — all within the bounds of your authorized interaction.\n\nThis comprehensive guide is designed to help beginners safely and effectively understand and use **BHEH_PHP_SHELL**.\n\n## Contact\n\nFor further inquiries, please contact [email@example.com](mailto:email@example.com).\n\n![BHEH_PHP_SHELL Screenshot](https://r00t-shell.com/wp-content/uploads/2025/02/BHEH_PHP_SHELL.png)\n\n\n\nMake sure to replace the image URLs with appropriate links for the logo and screenshots relevant to BHEH_PHP_SHELL. This README.md format is structured to provide clear and concise information for users.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Frootshelll%2Fbheh_php_shell","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Frootshelll%2Fbheh_php_shell","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Frootshelll%2Fbheh_php_shell/lists"}