This document discusses techniques for creating stealthy web application backdoors. It begins by explaining how simple modifications can help evade signature-based antivirus detection. Next, it analyzes some tools that can detect backdoors by searching for suspicious functions. The main part proposes three evasion techniques: 1) Using variable functions instead of direct calls 2) Embedding backdoor code directly in webpage 3) Hiding code in JPEG EXIF headers to avoid input-based detection. The goal is to design backdoors that are small, avoid common triggers and stay undetectable to automated scans and manual code reviews.