thezawad / rev-doorLinks
rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like other simple GET based backdoor but the only difference is it uses POST request to receive commands.
☆26Updated 9 years ago
Alternatives and similar repositories for rev-door
Users that are interested in rev-door are comparing it to the libraries listed below
Sorting:
- Security scripts and programs I've made☆8Updated 10 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- ☆17Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- Custom stagers with python encrypting proxy☆39Updated 10 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- ☆25Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Updated 8 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Metasploit Red Team Competition Modules☆13Updated 14 years ago
- Some simple and useful tools☆15Updated 7 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Self contained htaccess shells and attacks☆14Updated 7 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago