amtzespinosa / wp-backdoor
Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... Apart from reverse shells, of course, because I see some issues with the reverse shells stuff. That's why I posted this WordPress Backdoor.
☆21Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for wp-backdoor
- Find Email Spoofing Vulnerablity of domains☆92Updated 3 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆32Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- Mass bruteforce authentication of network protocols☆44Updated 11 months ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆23Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆56Updated 8 months ago
- xdebug 2.5.5 RCE exploit☆30Updated 2 years ago
- i will upload all the books that helped me in learning in this repo☆20Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 5 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆48Updated 8 months ago
- ProxyChecker Made in NodeJS☆37Updated 2 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 6 months ago
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've…☆24Updated 7 months ago
- ☆69Updated 6 months ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆11Updated 6 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆20Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆37Updated last week
- ☆13Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 6 months ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆38Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploit☆8Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated last year
- Enumeration & fingerprint tool☆23Updated 8 months ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…