CyberDoor - Automated Payload Generator Tool

Menu

  • Android >> payload generator
  • Windows >> payload generator
  • Linux >> payload generator
  • PHP >> php reverse shell(Remote File Inclusion)
  • FTP >> bruteforce with metasploit
  • SSH >> bruteforce with metasploit
  • WordPress >> exploiting wordpress website
  • FTP Backdoor >> VSFTPD v2.3.4 backdoor command execution
  • IP Cameras >> exploit cctv cameras

Android

This module uses the Metasploit framework built into Kali Linux to create and Android apk that will allow a back door into the users phone.

Windows

Metasploit can be used to make simple yet powerful backdoor for windows that can allow a hacker complete access and control over the target system.

Linux

Metasploit can be used to make simple yet powerful backdoor for Linux that can allow a hacker complete access and control over the target system.

PHP

Reverse shell is a kind of “virtual” shell that is initiated from a victim’s computer to connect with attacker’s computer. Once the connection is established, it allows attacker to send over commands to execute on the victim’s computer and to get results back. The attacker can execute any command/program on the victim’s computer at the same privilege as the current login user who initiated the connection.

FTP/SSH bruteforce

In a brute-force attack, the hacker uses all possible combinations of letters, numbers, special characters, and small and capital letters in an automated way to gain access over a host or a service. This type of attack has a high probability of success, but it requires an enormous amount of time to process all the combinations.

WordPress

On WordPress versions 5.0.0 and <= 4.9.8 it is possible to gain arbitrary code execution via a core vulnerability combining a Path Traversal and a Local File Inclusion. An attacker who gains access to an account with at least author privileges on the target can execute PHP code on the remote server.

FTP Backdoor

VSFTPD v2.3.4 contains a backdoor that is triggered by entering anystring:) as the username (no password required). After the backdoor is triggered, the target machine opens a shell on port 6200.

IP Cameras

How to find vulnerable webcams with the help of Shodan and Metasploit framework.


Installation

(run in root account)

 $ cd cyberdoor
 
 $ chmod +x install.sh

 $ ./install.sh

 $ cyberdoor

uninstaller

 $ chmod +x uninstaller.sh

 $ ./uninstaller.sh

#This Script Was Made By @cyberghost

Next Post Previous Post
1 Comments
  • Danial Zahoor
    Danial Zahoor September 4, 2022 at 1:30 PM

    $ git clone https://github.com/AnonymousAt3/cyberdoor

Add Comment
comment url