All Projects → backdoorhub → Shell Backdoor List

backdoorhub / Shell Backdoor List

Licence: mit
🎯 PHP / ASP - Shell Backdoor List 🎯

Programming Languages

shell
77523 projects
hack
652 projects
c99
33 projects

Projects that are alternatives of or similar to Shell Backdoor List

Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-53.12%)
Mutual labels:  hacking, backdoor
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-41.32%)
Mutual labels:  hacking, web-security
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-50.69%)
Mutual labels:  hacking, backdoor
Phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+312.5%)
Mutual labels:  hacking, backdoor
Rspet
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (-12.85%)
Mutual labels:  hacking, backdoor
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+340.28%)
Mutual labels:  hacking, web-security
Minesweeper
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-43.75%)
Mutual labels:  hacking, web-security
Holisticinfosec For Webdevelopers Fascicle0
📚 Overview 🔒 Tooling 🔒 Process 🔒 Physical 🔒 People 📚
Stars: ✭ 37 (-87.15%)
Mutual labels:  hacking, websecurity
Log Killer
Clear all your logs in [linux/windows] servers 🛡️
Stars: ✭ 252 (-12.5%)
Mutual labels:  hacking, web-security
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (-30.9%)
Mutual labels:  hacking, web-security
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+293.06%)
Mutual labels:  hacking, backdoor
firecracker
Stop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+52.08%)
Mutual labels:  web-security, websecurity
Project Tauro
A Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-81.94%)
Mutual labels:  hacking, web-security
Hg8045q
Pwning the Nuro issued Huawei HG8045Q
Stars: ✭ 107 (-62.85%)
Mutual labels:  hacking, backdoor
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+244.44%)
Mutual labels:  hacking, backdoor
Hacker101
Source code for Hacker101.com - a free online web and mobile security class.
Stars: ✭ 12,246 (+4152.08%)
Mutual labels:  hacking, web-security
Broxy
An HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+216.67%)
Mutual labels:  hacking, websecurity
Intranet penetration cheetsheets
做redteam时使用,修改自Ridter的https://github.com/Ridter/Intranet_Penetration_Tips
Stars: ✭ 29 (-89.93%)
Mutual labels:  hacking, websecurity
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-35.42%)
Mutual labels:  hacking, backdoor
Viewstate
ASP.NET View State Decoder
Stars: ✭ 77 (-73.26%)
Mutual labels:  asp-net, web-security

Shell Backdoor List

What is a shell backdoor ?

A backdoor shell is a malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to gain access to files stored on that site. Once it is uploaded, the hacker can use it to edit, delete, or download any files on the site, or upload their own.

How to upload :

Hackers usually take advantage of an upload panel designed for uploading images onto sites. This is usually found once the hacker has logged in as the admin of the site. Shells can also be uploaded via exploits or remote file inclusion, or a virus on the computer.

Uses :

Shells have many uses. They can be used to edit the webserver directory index page of site, and then hackers can leave their mark or "deface" for visitors to the site to see when they go to the homepage. Hackers may also use it to bruteforce FTP or cPanel, allowing them more access to the website. Shells can also be used to gain root access to the site. Some hackers may choose to host malware or spyware on the sites they have uploaded their shell to using various exploits.

  • Please note that many shells contain malware and 'Mark / deface page' might contain malware to obtain visitor's password as well.
Prevention :

To prevent a site from having a shell uploaded onto it, a webmaster must always keep up with the latest security updates and make sure to have a secure admin panel. They must also make sure that if they do have an admin panel they make sure it only permits the user to upload .jpeg, .png, and other image file types only.

Shell Backdoor List :

PHP Shell :
ASP Shell :
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].