thezawad / rev-door
rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like other simple GET based backdoor but the only difference is it uses POST request to receive commands.
☆26Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for rev-door
- Security scripts and programs I've made☆8Updated 10 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- Ransack Post Exploitation Tool☆16Updated 8 years ago
- ☆17Updated 10 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 3 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 13 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 4 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 7 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 8 years ago
- Weape-Wireless-EAP-Extractor☆26Updated 11 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- PHDAYS |||☆17Updated 11 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆27Updated 8 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- Metasploit Red Team Competition Modules☆13Updated 13 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago