[go: up one dir, main page]

Showing 7 open source projects for "shell backdoor"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • A privacy-first API that predicts global consumer preferences Icon
    A privacy-first API that predicts global consumer preferences

    Qloo AI adds value to a wide range of Fortune 500 companies in the media, technology, CPG, hospitality, and automotive sectors.

    Through our API, we provide contextualized personalization and insights based on a deep understanding of consumer behavior and more than 575 million people, places, and things.
    Learn More
  • 1
    webshell

    webshell

    This is a webshell open source project

    This is a webshell collection project. If you have downloaded this project, please submit a shell. This project covers various common scripts. Such as: asp, aspx, php, jsp, pl, py. Such as submitting various webshells, please do not change the name and password. All shells themselves do not guarantee whether there is a backdoor, but I will never add a backdoor deliberately when uploading by myself. Please don’t add a backdoor if you submit it.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Affliction X Cyber Shell Demo

    AFX Backdoor shell demonstration.

    Demo release of Affliction X webshell. Check us out on www.afflictionx.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • Endpoint Protection Software for Businesses | HYPERSECURE Icon
    Endpoint Protection Software for Businesses | HYPERSECURE

    DriveLock protects systems, data, end devices from data loss and misuse.

    The HYPERSECURE endpoint protection platform is a comprehensive suite of products and services enhanced by European third-party solutions. It ensures our customers’ IT security, regulatory compliance, and digital sovereignty.
    Learn More
  • 5

    Dan's PHP Backdoor

    This is a PHP backdoor that works on both *NIX and Windows.

    This initially started as a personal project but now that it's been included in Backtrack Linux I am taking it more seriously. While code revisions are going to be infrequent, this is where the documentation is and if you have found a bug please report it here.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    It´s a Backdoor Module for Linux OS 2.6.x only. Feel free to try it and modify it. It use a Telnet client on port TCP 19993. the backdoor grants a root shell without authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Defensive Tools For The Blind

    Defensive System Administrative Tools

    Defensive Tools For The Blind (DTFTB) is a collection of Windows and Linux tools that automate: post exploitation, backdoor, and rouge access discovery, for defenders. DTFTB allows a system defender to quickly and precisely locate common backdoor tendencies and system misconfigurations used by an attacker to maintain access. Additionally DTFTB provide automated access-denial tools, that prohibit the introduction of new backdoors to a system. DTFTB is primarily geared towards CTF or...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next