thezawad / rev-doorLinks
rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like other simple GET based backdoor but the only difference is it uses POST request to receive commands.
☆26Updated 9 years ago
Alternatives and similar repositories for rev-door
Users that are interested in rev-door are comparing it to the libraries listed below
Sorting:
- Working Rsh Client With Bind/Reverse Shell☆19Updated 10 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Updated 5 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- WeakNet PHP Execution Shell☆31Updated 10 years ago
- ☆17Updated 11 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Babel Scripting Framework☆43Updated 5 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- Custom stagers with python encrypting proxy☆40Updated 10 years ago
- Spray SMB with hashes, Then psexec☆32Updated 6 years ago
- Windows Offline Common Password Hash Checker☆29Updated 9 years ago
- Automatically performs the SMB relay attack☆73Updated 9 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆63Updated 9 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 10 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 8 years ago
- Tools for use with phishing frenzy☆11Updated 6 years ago
- ☆84Updated 10 years ago
- a CMD shell in masm that listens on port 8080☆12Updated 5 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Updated 10 years ago
- Yet another AV evasion tool☆118Updated 3 years ago
- Weape-Wireless-EAP-Extractor☆29Updated 12 years ago
- Mailing Phishing Framework - This Branch is UNSTABLE :: Official STABLE master branch at https://github.com/Section9Labs/Cartero☆48Updated 8 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 7 years ago