vexatioustendencies.com
PHP Backdoor Obfuscation Techniques
When an attacker leaves behind malicious PHP after a successful compromise, they typically make some attempt to obfuscate their code. While the title of this post is “PHP Backdoor Obfuscation…