fuzzdb/web-backdoors
2016-04-18 21:10:45 -04:00
..
asp from laudanum-1.0 2016-03-09 19:20:19 -05:00
c webshells 2010-04-22 01:45:45 +00:00
cfm from laudanum-1.0 2016-03-09 19:20:39 -05:00
exe webshells 2010-04-22 02:08:03 +00:00
jsp Create MANIFEST.MF 2016-03-09 19:25:26 -05:00
php Added files via upload 2016-03-09 19:26:08 -05:00
pl-cgi webshells 2010-04-22 01:45:45 +00:00
servlet webshells 2010-04-22 01:45:45 +00:00
sh webshells 2010-04-22 01:45:45 +00:00
wordpress Added files via upload 2016-03-09 19:27:58 -05:00
README.md Antivirus/antimalware bypass 2016-04-18 21:10:45 -04:00

Web backdoors from the wild, collected during incident response, submitted, and acquired otherwise.

Antivirus/antimalware bypass: Most antivirus/antimalware/waf/ids/etc will flag on these immediately, deleting a payload that otherwise could have been successfully uploaded. Basic evasion techniques are likely to work. Try modifying the code so that it's different enough to not trigger pattern-based signatures. Examples - delete comments, replace function names, replace variable names.


Laudanum-1.0 files credits: