amtzespinosa / wp-backdoorView external linksLinks
Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... Apart from reverse shells, of course, because I see some issues with the reverse shells stuff. That's why I posted this WordPress Backdoor.
☆26May 30, 2024Updated last year
Alternatives and similar repositories for wp-backdoor
Users that are interested in wp-backdoor are comparing it to the libraries listed below
Sorting:
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆12Dec 8, 2025Updated 2 months ago
- ☆11Nov 12, 2023Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Find social media accounts by username. Fast.☆10Jan 12, 2026Updated last month
- DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incom…☆18Updated this week
- NVD semiupdated database to be used with CVEScannerV2☆17Feb 1, 2026Updated 2 weeks ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- NailaoLoader: Hiding Execution Flow via Patching☆22Feb 27, 2025Updated 11 months ago
- ☆24Oct 18, 2022Updated 3 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- A simple tool to check if an email is associated with an Instagram account. Useful for OSINT and verifying account existence. 🕵️♂️✨☆20Oct 20, 2024Updated last year
- Crawljax: Crawling JavaScript-based Ajax Web Applications☆22Jan 27, 2026Updated 2 weeks ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Determine if an email address exists or not on ProtonMail with NeutrOSINT☆34Dec 14, 2025Updated 2 months ago
- PoC to self-delete a binary in C#☆35Feb 6, 2024Updated 2 years ago
- Employes Management App Using Laravel 8☆10Oct 2, 2021Updated 4 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆34Jan 18, 2026Updated 3 weeks ago
- OSINT tool for domain discovery☆10Apr 5, 2024Updated last year
- Esp32 (host) to Esp32 (target) serial flasher☆13Oct 6, 2022Updated 3 years ago
- Motel Management System with mobile-friendly Landing Page☆10Jan 3, 2022Updated 4 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- go-fasttld is a high performance effective top level domains (eTLD) extraction module.☆38Updated this week
- hashgen - the blazingly fast hash generator☆40Updated this week
- Welcome to h4cker_b00k, a sheet where the write up's of different CTF's are to learn ethical hacking...☆14Updated this week
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆35Updated this week
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆15Jan 17, 2026Updated 3 weeks ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- wordpress batch brute force☆11Sep 21, 2021Updated 4 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated last year