exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 53 RSS Feed

Files

Web Shell Backdoor 1.1
Posted Jul 4, 2013
Authored by M.R.S.CO

This is a simple PHP web shell backdoor.

tags | tool, web, shell, php, rootkit
systems | unix
SHA-256 | aaad39e328e8da519232f1d7feb60cfd3c991f2aa486739cdba8df7d746a8994

Related Files

Drupal drupgeddon3 Remote Code Execution
Posted Apr 26, 2018
Authored by Blaklis

This is a simple proof of concept exploit for Drupal versions prior to 7.58 that demonstrate the drupalgeddon3 authenticated remote code execution vulnerability.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2018-7602
SHA-256 | 083d892c5eba86d29cd75e8b8e8af90103d767eb04a11f57033b9dd9088214a0
KeePass Simple Dictionary Password Enumerator
Posted Apr 4, 2018
Authored by Todor Donev

This is a simple perl script to perform dictionary attacks against the KeePass password manager.

tags | cracker, perl
SHA-256 | 6543608fbc7bd69c9aed01176048fc5dbb4c5cfcf6b3eb1751f46ee2b6e9c7cd
PHP Vulnerability Audit Cheatsheet
Posted Oct 6, 2016
Authored by dustyfresh

This is a simple set of things to grep for that will help identify potential vulnerabilities in PHP code.

tags | paper, php, vulnerability
SHA-256 | 8700fa18f507e86dc84f2e92e04b5abdb40ce92fcbade4663491cd4222cd6069
Win32 x86 Reverse Shell In Assembly
Posted Mar 7, 2016
Authored by Andrea Sindoni

This is a simple reverse shell written in assembly for remote command execution on win32.

tags | remote, shell, shellcode
systems | windows
SHA-256 | 896d5235c9827973cc96df4bfde3554d14494a09f77c947ad44f5ed8f639a7a6
Juli Man-In-The-Middle Script
Posted Feb 21, 2015
Authored by em616

This is a simple perl script for setting up man-in-the-middle attacks on Linux.

tags | tool, perl
systems | linux, unix
SHA-256 | d38e8956c0b99e7aff2b55fc10799e47aad7c2ed96fe26151631c149f50fbb5d
LFI Image Helper 0.8
Posted Jan 9, 2015
Authored by Doddy Hackman

This is a simple script to infect images with PHP Backdoors for local file inclusion attacks.

tags | tool, local, php, rootkit, file inclusion
systems | unix
SHA-256 | 2417fa7ba59a45f47d8610a1495111a59f039bd586605208288ef92ac36d8906
D-Link Backdoor Czechr
Posted Oct 30, 2013
Authored by dustyfresh

This is a simple PHP script that checks to see if your D-Link device is vulnerable to the User-Agent backdoor.

tags | exploit, php
SHA-256 | b0f9b07e55de0f72f7056f20fafc5118ca5dbd0af300d0146663b52ab3d742d7
Simple PHP Backdoor
Posted Jun 25, 2013
Authored by infodox

This is a simple PHP backdoor using HTTP headers to inject the code as opposed to a GET or POST variable. Uses the fictional "Code: " header as an example, for learning purposes. This is not production code.

tags | tool, web, php, rootkit
systems | unix
SHA-256 | 397d3f851a08bef7d13138eedf2b87ab8e732b35f14514f58a2162c103188aab
SVN Extractor
Posted Apr 10, 2013
Authored by Anant Shrivastava | Site anantshri.info

This is a simple python tool written to extract all web resources by leveraging an exposed .SVN folder.

tags | tool, web, scanner, python
systems | unix
SHA-256 | 2675f79a415d1f1f96f60a6a337e25c1fb941c47573e612e32d8468062080155
Common Name Grabber Script
Posted Mar 4, 2013
Authored by nitr0us

This is a simple perl script that will scan a given IP range and extract the Common Name from all SSL certificates. It is useful for discovery during penetration tests.

tags | tool, perl
systems | unix
SHA-256 | 8bee3b0c0b06ba802a3816adb1b076af310701d747f2d5b5a2c0056512339dd9
Web Exploitation Engine 0.1
Posted Feb 12, 2013
Authored by infodox, LaNMaSteR53

This is a simple utility for exploiting command injection vulnerabilities in web applications. Supports POST and GET requests. Can deliver an "inline shell" or a (python) reverse shell.

tags | tool, web, shell, vulnerability, rootkit, python
systems | unix
SHA-256 | 2c82dcde1a7835fac49946c2d7c022271f0105c0e8c280133632994e909508cd
Control Panel Finder Script
Posted Dec 14, 2012
Authored by Amir Masoud

This is a simple script that looks for administrative web interfaces.

tags | tool, web, scanner
systems | unix
SHA-256 | 8b38d74ef497e3a86e7bc96c10d42b6295ff2d4263d94398896acce9df4f3109
DNS Denial Of Service Tool
Posted Jul 19, 2012

This is a simple snippet of c code that can be used for creating a denial of service condition against a DNS server.

tags | denial of service
SHA-256 | 23d955165e262da83e17e578062db6045a5487a02f461e22bbd4b3d9d5a162af
MD5 MySQL Brute Forcer
Posted May 10, 2012
Authored by baltazar

This is a simple python script for cracking MySQL MD5 passwords.

tags | cracker, python
SHA-256 | 2eabc6d50aa0308a12f9f621132d81ab8133f46b0854377425c4d9b0bac9f450
WordPress Bruteforce Script
Posted Apr 29, 2012
Authored by CorryL

This is a simple bash script for bruteforcing WordPress.

tags | cracker, bash
SHA-256 | a04595fb1fae7483302800dc402320dae1656bd040d010c93927bb2d7e92208a
rdpScan Network Checker
Posted Mar 18, 2012
Authored by silverstoneblue

This is a simple script that leverages nmap to scan for RDP-Server.

tags | tool, scanner
systems | unix
SHA-256 | 396f47878b4ab500666868acb58cf5871826fd5090559209cb91564b55b243e6
Viper FakeUpdate Script
Posted Feb 8, 2012
Authored by Bl4ck.Viper

This is a simple script to spawn dns spoofing, arp spoofing, a fake update page for Windows and a backdoored executable on a webserver to cause the Windows box to connect back. Requires Metasploit.

tags | tool, spoof, rootkit
systems | windows, unix
SHA-256 | fafffa5a5d80b84aa1e06752a7b0e865780f651a7fbff17eb1f66ed93cefbbbc
Port Tester 0.1
Posted Feb 3, 2012
Authored by localh0t

This is a simple little port scanning script written in python.

tags | tool, scanner, python
systems | unix
SHA-256 | ad34cb9d3975247aeac90686a80c09eb62fbcb41dbb7d953b4454b12630d2829
ICMP Ping Sweep
Posted Jan 17, 2012
Authored by James Stevenson | Site stev.org

This is a simple ICMP ping sweeping tool that takes in a range of IP addresses.

tags | tool, scanner
systems | unix
SHA-256 | f42e0187f536097a0191dec4e7b0d24b97b53a7add5c373fe34cd95f26a39102
Simple x64 XOR Shellcode Encoder / Loader
Posted Aug 30, 2011
Authored by entropy | Site phiral.net

This is a simple tutorial that also provides a code example on doing a x64 xor encoder and loader for shellcode. hello_world, shell with setreuid, and portbind shellcode examples are provided.

tags | paper, shell, shellcode
SHA-256 | 01dd8d4138095d6e5cd36ad14d49a7c9867d04d3b19cf8010f5b4ffa35e94746
LFI Scanner 4.0
Posted Jul 6, 2011
Authored by Bl4ck.Viper

This is a simple perl script called Viper LFI Scanner that enumerates local file inclusion attempts when given a specific target.

Changes: New bypass method added and ability to read /etc/passwd.
tags | tool, local, scanner, perl, file inclusion
systems | unix
SHA-256 | 29bd41af57ba7569fad9b21b50e8ad9096741e3ee23063f560b4b57da70a4d8d
Yakamoz phpMyAdmin Finder
Posted Jun 30, 2011
Authored by Bl4ck.Viper

This is a simple perl script that enumerates various possible directories on a given website in order to determine whether or not a phpMyAdmin instance may be installed.

tags | tool, scanner, perl
systems | unix
SHA-256 | 1f00827393ec5f0b4d92aa4c0dfd1657cfa2e7a567c31c7aec7d9e2d47baf1dc
LFI Scanner 3.0
Posted Jun 16, 2011
Authored by Bl4ck.Viper

This is a simple perl script called Viper LFI Scanner that enumerates local file inclusion attempts when given a specific target.

tags | tool, local, scanner, perl, file inclusion
systems | unix
SHA-256 | 4abd76909ca126c20a3849cadff2d7e6ced90e4b1914278a4bd61990ade40679
FTP Brute Forcing Tool 0.1
Posted Mar 16, 2011
Authored by baltazar

This is a simple python script to brute force ftpd.

tags | cracker, python
SHA-256 | 75f9adacc2779c88694791ef3852491c0f039afccdbe8c1600dbf7fde13417ba
Exec2Shell Converter Tool
Posted Feb 25, 2011
Authored by C3lt1c

This is a simple executable to shellcode converter tool. Video for usage is included.

tags | shellcode
SHA-256 | 615bb76846010e2d9b02e6e2405d54049a777f9250aebb20c701cbffbd929de8
Page 1 of 3
Back123Next

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    16 Files
  • 2
    Nov 2nd
    17 Files
  • 3
    Nov 3rd
    17 Files
  • 4
    Nov 4th
    11 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    3 Files
  • 8
    Nov 8th
    59 Files
  • 9
    Nov 9th
    12 Files
  • 10
    Nov 10th
    6 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    1 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    9 Files
  • 15
    Nov 15th
    33 Files
  • 16
    Nov 16th
    53 Files
  • 17
    Nov 17th
    11 Files
  • 18
    Nov 18th
    14 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    26 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    10 Files
  • 24
    Nov 24th
    9 Files
  • 25
    Nov 25th
    11 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    20 Files
  • 29
    Nov 29th
    9 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close