From 0535bbd2fb9874963ee0e5a9b078c1c7fad4e651 Mon Sep 17 00:00:00 2001 From: Adam Muntner Date: Mon, 10 Oct 2016 03:44:24 -0400 Subject: [PATCH] add link to webshell git repo --- web-backdoors/README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/web-backdoors/README.md b/web-backdoors/README.md index 906c4eb..a2065d1 100644 --- a/web-backdoors/README.md +++ b/web-backdoors/README.md @@ -3,6 +3,8 @@ Web backdoors from the wild, collected during incident response, submitted, and Antivirus/antimalware bypass: Most antivirus/antimalware/waf/ids/etc will flag on these immediately, deleting a payload that otherwise could have been successfully uploaded. Basic evasion techniques are likely to work. Try modifying the code so that it's different enough to not trigger pattern-based signatures. Examples - delete comments, replace function names, replace variable names. +This repo has many more: https://github.com/xl7dev/WebShell + ---------------------------------------- Laudanum-1.0 files credits: