<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>reverse shell Archives - BinaryTides</title>
	<atom:link href="https://www.binarytides.com/tag/reverse-shell/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.binarytides.com/tag/reverse-shell/</link>
	<description>News, Technology, Entertainment and more</description>
	<lastBuildDate>Sun, 18 Feb 2018 17:04:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
	<item>
		<title>Php reverse shell with netcat</title>
		<link>https://www.binarytides.com/php-reverse-shell-with-netcat/</link>
					<comments>https://www.binarytides.com/php-reverse-shell-with-netcat/#comments</comments>
		
		<dc:creator><![CDATA[Silver Moon]]></dc:creator>
		<pubDate>Fri, 12 Apr 2013 11:55:32 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[netcat]]></category>
		<category><![CDATA[php]]></category>
		<category><![CDATA[reverse shell]]></category>
		<guid isPermaLink="false">http://www.binarytides.com/?p=4649</guid>

					<description><![CDATA[<p>Netcat is a command line utility that can perform lots of tasks like telnet. In this tutorial we shall use it to get a reverse shell using a php backdoor.</p>
<p>The post <a href="https://www.binarytides.com/php-reverse-shell-with-netcat/">Php reverse shell with netcat</a> appeared first on <a href="https://www.binarytides.com">BinaryTides</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.binarytides.com/php-reverse-shell-with-netcat/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>Php reverse shell with metasploit</title>
		<link>https://www.binarytides.com/php-reverse-shell-with-metasploit/</link>
					<comments>https://www.binarytides.com/php-reverse-shell-with-metasploit/#comments</comments>
		
		<dc:creator><![CDATA[Silver Moon]]></dc:creator>
		<pubDate>Mon, 04 Mar 2013 12:12:56 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[metasploit]]></category>
		<category><![CDATA[php]]></category>
		<category><![CDATA[reverse shell]]></category>
		<guid isPermaLink="false">http://www.binarytides.com/?p=4566</guid>

					<description><![CDATA[<p>After hacking a web application or server to such an extent that you can upload files to it, the next thing to try is get a proper shell on the system. The most common approach is to create reverse shells. In this approach first a listener program is run on the hacker's machine and then... <span class="read-more"><a href="https://www.binarytides.com/php-reverse-shell-with-metasploit/">Read More &#187;</a></span></p>
<p>The post <a href="https://www.binarytides.com/php-reverse-shell-with-metasploit/">Php reverse shell with metasploit</a> appeared first on <a href="https://www.binarytides.com">BinaryTides</a>.</p>
]]></description>
		
					<wfw:commentRss>https://www.binarytides.com/php-reverse-shell-with-metasploit/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
			</item>
	</channel>
</rss>
