rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like other simple GET based backdoor but the only difference is it uses POST request to receive commands.
☆26May 12, 2016Updated 9 years ago
Alternatives and similar repositories for rev-door
Users that are interested in rev-door are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- LNHG - Mass Web Fingerprinter☆63Feb 22, 2016Updated 10 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Mar 30, 2016Updated 10 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆59Jun 26, 2015Updated 10 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55May 8, 2021Updated 4 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- libpcap based ICMP encrypted backdoor for linux.☆132Mar 26, 2021Updated 5 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- A simple trojan in python, disguised as an animated ASCII bunny (for pedagogical purposes)☆47Sep 29, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tools for encrypting and decrypting things using Cisco's type 7 encryption.☆15Jan 11, 2013Updated 13 years ago
- Shell script to create an onion-router for your Raspberry Pi from a stock Moebius image☆28Jul 10, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- Guides for locking down a computer☆12Mar 4, 2023Updated 3 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Jun 26, 2022Updated 3 years ago
- Simple but effective word list transmutation command-line app. Feed it words, and mangle them into new variations quickly and easily!☆33May 5, 2016Updated 9 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆38Aug 17, 2022Updated 3 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated 2 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A hacked together PHP shell designed to be stealthy and portable☆52Apr 1, 2014Updated 12 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆87Sep 26, 2016Updated 9 years ago
- Check UNIX/Linux systems for privilege escalation☆126Mar 31, 2016Updated 10 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- builds database/visualizations of LAN structure from passively sifted information☆148May 30, 2014Updated 11 years ago
- Scripts that aren't PowerShell☆48Jan 13, 2020Updated 6 years ago