fuzzdb/web-backdoors
2016-10-16 15:47:43 -04:00
..
asp from laudanum-1.0 2016-03-09 19:20:19 -05:00
c webshells 2010-04-22 01:45:45 +00:00
cfm from laudanum-1.0 2016-03-09 19:20:39 -05:00
exe webshells 2010-04-22 02:08:03 +00:00
jsp Create MANIFEST.MF 2016-03-09 19:25:26 -05:00
php Tiny php remote os commanding backdoor 2016-10-16 15:47:43 -04:00
pl-cgi webshells 2010-04-22 01:45:45 +00:00
servlet webshells 2010-04-22 01:45:45 +00:00
sh webshells 2010-04-22 01:45:45 +00:00
wordpress Added files via upload 2016-03-09 19:27:58 -05:00
README.md add link to webshell git repo 2016-10-10 03:44:24 -04:00

Web backdoors from the wild, collected during incident response, submitted, and acquired otherwise.

Antivirus/antimalware bypass: Most antivirus/antimalware/waf/ids/etc will flag on these immediately, deleting a payload that otherwise could have been successfully uploaded. Basic evasion techniques are likely to work. Try modifying the code so that it's different enough to not trigger pattern-based signatures. Examples - delete comments, replace function names, replace variable names.

This repo has many more: https://github.com/xl7dev/WebShell


Laudanum-1.0 files credits: