Levi Li
|
7451dc532b
|
webshell-detect-bypass
from: https://github.com/LandGrey/webshell-detect-bypass/tree/master/webshell/asp
author: Build By LandGrey
|
2018-12-20 11:41:24 +08:00 |
|
tennc
|
e872dddc41
|
Create bypass-all.asp
from : https://github.com/LandGrey
author : LandGrey
|
2018-06-02 15:23:54 +08:00 |
|
tennc
|
c9479faa14
|
add webshell.asp @saveeoo 👍
from : https://gist.github.com/saveeoo/a8af827510df085f7f1c83208a898098
author : saveeoo
|
2016-05-14 17:32:00 +08:00 |
|
tennc
|
3fc2d3a889
|
Create good_1.asp
当参数task=1时
如果你传递参数
http://222.39.14.164/xdexdb4w.asp;.txt?task=1&paths=jtgw&nnfilename=1.asp&content=lalla
参数说明
task:执行命令的id
paths:在哪个文件夹写文件(如果是空,则在在最后一个文件夹下写入文件)
nnfilename:文件名
content:文件内容
主要这个被写出来的文件被隐藏成为系统文件类型,而且是文件为只读
当task=2时
当传递的参数为
http://localhost/1.asp?task=2&paths=&defaulthtml=mengmeng&nnfilename=1.txt&content=mamama
这个功能只是比上一个多出来了一个创建文件夹的功能
defaulthtml:创建的文件夹名字
from: zone.wooyun.org
|
2015-12-17 09:55:51 +08:00 |
|
tennc
|
a9c343b74e
|
Create base.asp
password : base
from : zone.wooyun.org
|
2015-06-30 10:02:04 +08:00 |
|
tennc
|
43091bf604
|
Create xslt.asp
from: http://drops.wooyun.org/tips/5799
|
2015-05-16 11:33:15 +08:00 |
|
tennc
|
aa27e0c457
|
Create cmd提权马.asp
用法:
http://192.168.1.108/moonshell.aspx?shell=C:\WINDOWS\system32\cmd.exe&sb=ipconfig
from: zone.wooyun.org
|
2015-05-08 09:46:11 +08:00 |
|
tennc
|
73ec37f7e7
|
Create bypass_safedog_03.asp
bypass caidao 接,密码:z
可能不过狗
bypass caidao 可能含有后门,除非菜刀是内部版或非公开版
from: zone.wooyun.org
|
2015-05-08 09:45:10 +08:00 |
|
tennc
|
bdc00aac7f
|
Create bypass_safedog_02.asp
bypass caidao 接,密码:-7
可能不过狗
bypass caidao 可能含有后门,除非菜刀是内部版或非公开版
from: zone.wooyun.org
|
2015-05-08 09:43:40 +08:00 |
|
tennc
|
254323e616
|
Create bypass_safedog_01.asp
bypass caidao 接,密码:z
可能不过狗
bypass caidao 可能含有后门,除非菜刀是内部版或非公开版
from: zone.wooyun.org
|
2015-05-08 09:41:40 +08:00 |
|
Andrea De Pasquale
|
6feb434f76
|
grasp ASP webshell
https://www.virustotal.com/en/file/5767c1bb1b6d4391d8536b2c0736820fee8f7f1b0017c754a6ee7deccbc693b4/analysis/
|
2015-03-20 13:20:43 +01:00 |
|
abcd
|
bf2518ea25
|
readme.txt
在1.4基础上改进:
1、修正了打包非web根目录的一个问题
2、使用上传类
3、集成了80后黑客代表bin的saupload功能
4、sql操作增加导出数据到excel功能
5、集成陆羽黑客的有回显可反复执行的serv-u提权
6、数据库操作兼容非ms database
7、改进克隆、文件属性修改界面
8、sql sa权限实现用shell.adduser加用户
9、sql sa权限实现用xp_makecab替换文件
10、sql 注册表操作项目合并
11、应国际知名黑客bin要求,增加了sadownload功能
12、勉强算是解决了在开启编码的情况下后退再重复提交导致出错
13、兼容非IE浏览器
ps:访问请带参数 ?goaction=login
|
2015-01-13 07:05:37 +08:00 |
|
tennc
|
5e4358b31b
|
add asp shell
|
2014-11-21 09:50:49 +08:00 |
|
tennc
|
a992550251
|
add bypass-waf.asp
|
2014-11-17 10:26:20 +08:00 |
|
tennc
|
0119015514
|
add asp webshell
|
2014-05-22 11:15:41 +08:00 |
|
tennc
|
cf5003d2a2
|
add the word webshell
|
2014-05-22 08:41:53 +08:00 |
|
tennc
|
8870eb9484
|
add some webshell
|
2014-05-19 09:10:34 +08:00 |
|
tennc
|
c070f0793f
|
add a asp webshell
bypass iisuser
|
2014-03-26 15:41:02 +08:00 |
|
tennc
|
cc6a63e70e
|
change file type
|
2014-03-12 09:45:40 +08:00 |
|
tennc
|
a2c8423d1e
|
update webshell with expdoor-com
|
2014-03-12 09:45:11 +08:00 |
|
tennc
|
f56a2e26ef
|
update source lpl38-com webshell
Please check it
|
2014-03-12 08:50:59 +08:00 |
|
tennc
|
c04733c2d4
|
RadHat-webshell-del-backdoor
T00ls论坛Gu3st去后门版,请自行甄别
|
2014-03-12 08:42:14 +08:00 |
|
tennc
|
feeb07164b
|
update asp shell
update mumaasp.com shell
|
2013-11-09 15:00:44 +08:00 |
|
tennc
|
f6d0a357d2
|
update asp webshell
404 team asp webshell
|
2013-10-29 17:20:22 +08:00 |
|
tennc
|
3e06df61e5
|
update asp shell
a asp shell bypass safedog
|
2013-10-18 08:17:22 +08:00 |
|
tennc
|
98001733fa
|
update 3 spy
aspx php jsp 3 spy
|
2013-10-12 11:18:33 +08:00 |
|
tennc
|
ea6306d16f
|
update
r00ts shell
|
2013-09-20 17:07:46 +08:00 |
|
tennc
|
15cd7ad231
|
update
|
2013-09-06 08:38:12 +08:00 |
|
tennc
|
9db4327d81
|
update
|
2013-06-10 15:05:53 +08:00 |
|
tennc
|
733618bc2a
|
update webshell Penetration testing2013 beta
|
2013-05-24 08:23:49 +08:00 |
|