amtzespinosa / wp-backdoorLinks
Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... Apart from reverse shells, of course, because I see some issues with the reverse shells stuff. That's why I posted this WordPress Backdoor.
☆24Updated last year
Alternatives and similar repositories for wp-backdoor
Users that are interested in wp-backdoor are comparing it to the libraries listed below
Sorting:
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.☆54Updated 9 months ago
- Social Engineering Browser Update Attack.☆58Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆25Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆142Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 3 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- ☆74Updated this week
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆73Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆38Updated 5 months ago
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆81Updated 2 years ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆43Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 6 months ago
- Argument injection vulnerability in PHP☆12Updated last year
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Mass bruteforce authentication of common services with common credentials.☆52Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆109Updated last year
- A look into Google's JavaScript Clientside Security☆66Updated 2 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- POC exploit for CVE-2015-10141☆30Updated 4 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year