thezawad / rev-doorLinks
rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like other simple GET based backdoor but the only difference is it uses POST request to receive commands.
☆26Updated 9 years ago
Alternatives and similar repositories for rev-door
Users that are interested in rev-door are comparing it to the libraries listed below
Sorting:
- Security scripts and programs I've made☆8Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- ☆17Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Metasploit Red Team Competition Modules☆13Updated 14 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- Custom stagers with python encrypting proxy☆39Updated 10 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- MS15-076 Privilege Escalation☆16Updated 9 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Tools for use with phishing frenzy☆11Updated 6 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- PHDAYS |||☆17Updated 12 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- ☆19Updated 8 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- ☆27Updated 7 years ago