thezawad / rev-door
rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like other simple GET based backdoor but the only difference is it uses POST request to receive commands.
☆26Updated 8 years ago
Alternatives and similar repositories for rev-door:
Users that are interested in rev-door are comparing it to the libraries listed below
- Security scripts and programs I've made☆8Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- ☆17Updated 10 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Custom stagers with python encrypting proxy☆39Updated 9 years ago
- Metasploit Red Team Competition Modules☆13Updated 14 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 9 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- MS15-076 Privilege Escalation☆16Updated 9 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Updated 9 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- PHDAYS |||☆17Updated 11 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Updated 9 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago