Tag Archives: Backdoor

GCAT – Fully featured backdoor that uses Gmail as a C&C server

There are many tools that allow to generate backdoors and they are used during a penetration testing program or security awareness where the presenter demonstrate how it is easy to have a full control on a remote vulnerable system. The

RPEF- Tool to generate routers firmware with backdoor


Network devices and routers are the best target for several reasons such as  they include a firmware that can be shipped with backdoor and there is no antivirus to detect/identify malicious code on the firmware. This makes with each router

FIFA World Cup 2014 used for spreading malwares

FIFA events generate a lot of attention for all types of activities including cyber crime. many people are now following the World Cup news in Brazil and searching where it is possible to watch the 2014 FIFA World Cup. TrendMicro

Samsung Galaxy Devices Shipped with Backdoors


New vulnerability in smartphones Samsung Galaxy have been disclosed by Replicant a free project version of Android. the bug embeds a backdoor that provides remote access to the data stored on the device of Samsung galaxy.  Modern smartphones include two separate

Backdoor Found in Linksys and Netgear

Security researchers found a new backdoor in Linksys WAG200G. The Firmware include a service for remote connection at port 32764 , this allows remote user to get the router configuration settings , including user name , admin password, password for

Weevely 1.1 – PHP Webshell

Weevely – is a PHP webshell that provides SSH connection to manage website remotely. it can be used as a backdoor system to PoC during a pentest or a web shell to manage legit web accounts. The shell consists of

Adobe fixes two exploited vulnerabilities


If you are using Adobe product than there is new update that are going to fix two vulnerabilities can be used by attacker to control windows based system remotely. According to Symantec this bug has been exploited since the first