amtzespinosa / wp-backdoorLinks
Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... Apart from reverse shells, of course, because I see some issues with the reverse shells stuff. That's why I posted this WordPress Backdoor.
☆24Updated last year
Alternatives and similar repositories for wp-backdoor
Users that are interested in wp-backdoor are comparing it to the libraries listed below
Sorting:
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Updated last year
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.☆54Updated 10 months ago
- Mass bruteforce authentication of common services with common credentials.☆53Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆42Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆25Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆74Updated 2 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- External recon toolkit☆54Updated last year
- A command-line utility designed to discover subdomains for a given domain in a simple, efficient way. It works by gathering information f…☆115Updated last month
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Updated 2 years ago
- ☆78Updated last month
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation☆82Updated 2 years ago
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Updated 2 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆115Updated 8 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated 6 months ago
- PassBreaker☆65Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago