tennc
b59b949389
Create bypass-with-base32.php
2021-01-04 21:50:18 +08:00
tennc
eafae576c9
Create bypass2021-01-04-01.php
...
from https://mp.weixin.qq.com/s/s0piu9qU8oq6M1qAZCyI4g
2021-01-04 21:47:58 +08:00
tennc
a6546d03ee
Create getConstants2.php
...
use: xxx/webshell/1?<>=system(whoami)
from : https://xz.aliyun.com/t/8684
2020-12-28 22:15:54 +08:00
tennc
fd35f195c1
Create getConstants.php
...
use: xxxxxx/getConstants?1=phpinfo()
from : https://xz.aliyun.com/t/8684
2020-12-28 01:08:19 +08:00
tennc
b66c3bb616
add YXNzZXJ0YWE.php bypass 啊D
...
from: https://xz.aliyun.com/t/8684
2020-12-28 01:05:10 +08:00
tennc
c9755402a6
add Webshell免杀的思考与学习.mhtml
...
from : https://xz.aliyun.com/t/8684
author: Isabellae
2020-12-28 01:02:49 +08:00
tennc
c7c6b39833
Create shell2020-12-06.php
...
password:rebeyond
2020-12-07 23:05:11 +08:00
tennc
f875e7b780
Create Shu1337.php
...
from: https://github.com/linuxsec/shu-shell
@linuxsec 👍
2020-11-18 22:20:42 +08:00
tennc
da33d92ba8
Update README_EN.md
2020-11-08 20:43:01 +08:00
tennc
9ef78d3996
Update README.md
2020-11-08 20:42:38 +08:00
tennc
9495a6c59e
Rename README_ZH.md to README.md
2020-11-08 20:40:40 +08:00
tennc
0266c30801
Rename README.md to README_EN.md
2020-11-08 20:40:19 +08:00
tennc
9f63d98db5
Update README.md
2020-11-08 20:32:41 +08:00
tennc
e467712762
Create README_ZH.md
...
add README_ZH.md
2020-11-08 20:30:54 +08:00
tennc
3ffc1b6312
Merge pull request #40 from rubo77/patch-1
...
Reame: translate to english
2020-11-08 20:23:40 +08:00
Ruben Barkow-Kuder
fc276c0bb0
Reame: translate to english
...
I used mainly Google translate, so I could have gotten some things wrong, please use this as a first stept to translate your Readme into english.
you could leave the original as `Readme_zn.md` if you like
2020-11-07 14:27:28 +01:00
tennc
e9b09f671b
Merge pull request #38 from RobinvandenHurk/patch-1
...
Fixed label
2020-10-22 23:26:08 +08:00
Robin van den Hurk
acb55c61bb
Fixed label
2020-10-13 14:46:48 +02:00
tennc
7e6629ab49
Update README.md
2020-10-11 19:15:53 +08:00
tennc
7105ac90a5
Create get1.php
...
use: "`****`"
from: 19e3e0ab25
@thephenix4 👍
2020-10-11 19:11:12 +08:00
tennc
976ca14a7d
Create webshell-without-alphanumeric2.php
...
what ??
from: 3ea2d589ae
@oktavandi 👍
2020-10-11 19:07:02 +08:00
tennc
823aa6ff59
add 冰蝎,从入门到魔改.pdf
2020-10-06 12:55:18 +08:00
tennc
67468c8243
add 冰蝎,从入门到魔改(续).pdf
2020-10-06 12:49:49 +08:00
tennc
df832d0366
Create cotent01.md
...
from : https://blog.mrcl0wn.com/2019/01/hold-door-hold-backdoor-php.html
2020-09-22 13:06:26 +08:00
tennc
dd21bebfc0
add some submodule webshell project to this project
2020-09-14 13:32:03 +08:00
tennc
25f1dc52ce
Update README.md
2020-09-14 13:07:25 +08:00
tennc
222fc05087
Update README.md
2020-09-14 13:04:36 +08:00
tennc
ce94519fd0
Update README.md
...
add some project webshell link
2020-09-14 13:03:43 +08:00
tennc
31c6b56f25
Update other shell repository.md
2020-09-07 23:30:54 +08:00
tennc
5f3741952d
Update and rename other shell repository to other shell repository.md
2020-09-07 23:30:07 +08:00
tennc
43d9582172
Create php_webshell.py
...
create bypass safedog webshell with python
from : https://github.com/pureqh/webshell
thanks to pureqh 👍
2020-09-05 17:44:37 +08:00
tennc
0da00dfca4
add php马-bypass _ alin'Blog.pdf
...
from : http://alin.run/2020/08/04/php-webshell-bypass/
2020-09-03 21:08:06 +08:00
tennc
719eb9131d
Create ass.php
...
请求时,设置Referer头,后面以”ass****”结尾即可,比如:Referer: http://www.target.com/ass.php 。
在使用Cknife时,注意软件实现有缺陷,会从第二个”:”处截断,可改成Referer: http%3a//www.target.com/ass.php
from : http://alin.run/2020/08/04/php-webshell-bypass/
2020-09-03 21:00:49 +08:00
tennc
9fd273a5a5
Create webshell-detect-bypass
...
from : LandGrey 👍
2020-09-03 20:58:19 +08:00
tennc
aeaf7516dd
add 从Webshell的视角谈攻防对抗.pdf
...
from : https://www.freebuf.com/articles/network/247359.html
2020-09-01 21:06:04 +08:00
tennc
3ab759a148
add Upload与WAF的那些事.pdf
...
from : http://www.0x3.biz/archives/1925.html
2020-09-01 21:01:53 +08:00
tennc
2bea3becb2
Create 2020-08-31-01.php
...
from: https://github.com/clm123321/tongda_oa_rce/blob/master/tongda.py#L145
2020-08-31 21:39:22 +08:00
tennc
a6acc071dd
Delete CNAME
2020-08-30 15:16:02 +08:00
tennc
41e8490caf
Delete CNAME
2020-08-30 15:14:38 +08:00
tennc
1f9390b340
Update CNAME
...
rewrite cname
2020-08-30 15:12:29 +08:00
tennc
e864fcd511
Create create_code_with_xor.py
...
create some code for php xor to bypass safedog
from : https://www.sqlsec.com/2020/07/shell.html#toc-heading-24
2020-08-30 14:05:29 +08:00
tennc
105f3ed358
Update README.md
...
add some project web site url
2020-08-29 15:33:12 +08:00
tennc
a83d9cb7e9
Update README.md
...
rewrite
2020-08-29 15:27:36 +08:00
tennc
349039f2d5
Merge pull request #35 from nil0x42/patch-1
...
Add `phpsploit` (C2 framework via PHP oneliner)
2020-08-29 15:25:06 +08:00
tennc
a09c535f6d
Create bt_yincang_shell.md
...
from: https://mp.weixin.qq.com/s/-8JE1ovWKOorNr6MCAgejg
wx_id: 漏洞推送
2020-08-29 14:59:27 +08:00
nil0x42
57d76f059e
Add phpsploit
(C2 framework via PHP oneliner)
...
Add phpsploit tool (https://github.com/nil0x42/phpsploit ):
Full-featured C2 framework which silently persists on webserver via evil PHP oneliner, with a complete asrenal of post-exploitation & privesc features
Ask me if you have any question 👍
2020-08-26 17:15:11 +00:00
tennc
3fb8abd7c9
Create php_custom_script_for_mysql_fix.php
...
fix php_custom_script_for_mysql_fix.php 乱码
2020-08-26 22:48:48 +08:00
tennc
e458de3dc7
Create python2_custom_script.py
...
add python2_custom_script.py
2020-08-26 22:47:31 +08:00
tennc
efe66a8e7b
Create jspx_custom_script_for_mysql.jspx
...
add jspx_custom_script_for_mysql
2020-08-26 22:46:46 +08:00
tennc
c6f42dd08c
Create jsp_custom_script_for_oracle.jsp
...
add jsp_custom_script_for_oracle.jsp
2020-08-26 22:46:05 +08:00