thezawad / rev-doorLinks
rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like other simple GET based backdoor but the only difference is it uses POST request to receive commands.
☆26Updated 9 years ago
Alternatives and similar repositories for rev-door
Users that are interested in rev-door are comparing it to the libraries listed below
Sorting:
- Working Rsh Client With Bind/Reverse Shell☆20Updated 10 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- ☆17Updated 10 years ago
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Updated 4 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 9 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 14 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆62Updated 9 years ago
- Custom stagers with python encrypting proxy☆40Updated 10 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Automatically performs the SMB relay attack☆73Updated 9 years ago
- Spray SMB with hashes, Then psexec☆32Updated 6 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 8 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 9 years ago
- Tools for use with phishing frenzy☆11Updated 6 years ago
- Simple but effective word list transmutation command-line app. Feed it words, and mangle them into new variations quickly and easily!☆33Updated 9 years ago
- ☆86Updated 10 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 7 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 10 years ago
- a CMD shell in masm that listens on port 8080☆12Updated 4 years ago
- Windows Offline Common Password Hash Checker☆29Updated 9 years ago
- ☆27Updated 8 years ago
- Scripts that aren't PowerShell☆48Updated 5 years ago