Commit graph

31 commits

Author SHA1 Message Date
Robin van den Hurk
acb55c61bb
Fixed label 2020-10-13 14:46:48 +02:00
Levi Li
7451dc532b
webshell-detect-bypass
from: https://github.com/LandGrey/webshell-detect-bypass/tree/master/webshell/asp
author: Build By LandGrey
2018-12-20 11:41:24 +08:00
tennc
e872dddc41
Create bypass-all.asp
from : https://github.com/LandGrey
author : LandGrey
2018-06-02 15:23:54 +08:00
tennc
c9479faa14 add webshell.asp @saveeoo 👍
from : https://gist.github.com/saveeoo/a8af827510df085f7f1c83208a898098
author : saveeoo
2016-05-14 17:32:00 +08:00
tennc
3fc2d3a889 Create good_1.asp
当参数task=1时 
如果你传递参数 
http://222.39.14.164/xdexdb4w.asp;.txt?task=1&paths=jtgw&nnfilename=1.asp&content=lalla 
参数说明 
task:执行命令的id 
paths:在哪个文件夹写文件(如果是空,则在在最后一个文件夹下写入文件) 
nnfilename:文件名 
content:文件内容 
主要这个被写出来的文件被隐藏成为系统文件类型,而且是文件为只读 
当task=2时 
当传递的参数为 
http://localhost/1.asp?task=2&paths=&defaulthtml=mengmeng&nnfilename=1.txt&content=mamama 
这个功能只是比上一个多出来了一个创建文件夹的功能 
defaulthtml:创建的文件夹名字 
from: zone.wooyun.org
2015-12-17 09:55:51 +08:00
tennc
a9c343b74e Create base.asp
password : base
from : zone.wooyun.org
2015-06-30 10:02:04 +08:00
tennc
43091bf604 Create xslt.asp
from: http://drops.wooyun.org/tips/5799
2015-05-16 11:33:15 +08:00
tennc
aa27e0c457 Create cmd提权马.asp
用法:
http://192.168.1.108/moonshell.aspx?shell=C:\WINDOWS\system32\cmd.exe&sb=ipconfig
from: zone.wooyun.org
2015-05-08 09:46:11 +08:00
tennc
73ec37f7e7 Create bypass_safedog_03.asp
bypass caidao 接,密码:z
可能不过狗
bypass caidao 可能含有后门,除非菜刀是内部版或非公开版
from: zone.wooyun.org
2015-05-08 09:45:10 +08:00
tennc
bdc00aac7f Create bypass_safedog_02.asp
bypass caidao 接,密码:-7
可能不过狗
bypass caidao 可能含有后门,除非菜刀是内部版或非公开版
from: zone.wooyun.org
2015-05-08 09:43:40 +08:00
tennc
254323e616 Create bypass_safedog_01.asp
bypass caidao 接,密码:z
可能不过狗
bypass caidao 可能含有后门,除非菜刀是内部版或非公开版
from: zone.wooyun.org
2015-05-08 09:41:40 +08:00
Andrea De Pasquale
6feb434f76 grasp ASP webshell
https://www.virustotal.com/en/file/5767c1bb1b6d4391d8536b2c0736820fee8f7f1b0017c754a6ee7deccbc693b4/analysis/
2015-03-20 13:20:43 +01:00
abcd
bf2518ea25 readme.txt
在1.4基础上改进:
1、修正了打包非web根目录的一个问题
2、使用上传类
3、集成了80后黑客代表bin的saupload功能
4、sql操作增加导出数据到excel功能
5、集成陆羽黑客的有回显可反复执行的serv-u提权
6、数据库操作兼容非ms database
7、改进克隆、文件属性修改界面
8、sql sa权限实现用shell.adduser加用户
9、sql sa权限实现用xp_makecab替换文件
10、sql 注册表操作项目合并
11、应国际知名黑客bin要求,增加了sadownload功能
12、勉强算是解决了在开启编码的情况下后退再重复提交导致出错
13、兼容非IE浏览器

ps:访问请带参数 ?goaction=login
2015-01-13 07:05:37 +08:00
tennc
5e4358b31b add asp shell 2014-11-21 09:50:49 +08:00
tennc
a992550251 add bypass-waf.asp 2014-11-17 10:26:20 +08:00
tennc
0119015514 add asp webshell 2014-05-22 11:15:41 +08:00
tennc
cf5003d2a2 add the word webshell 2014-05-22 08:41:53 +08:00
tennc
8870eb9484 add some webshell 2014-05-19 09:10:34 +08:00
tennc
c070f0793f add a asp webshell
bypass iisuser
2014-03-26 15:41:02 +08:00
tennc
cc6a63e70e change file type 2014-03-12 09:45:40 +08:00
tennc
a2c8423d1e update webshell with expdoor-com 2014-03-12 09:45:11 +08:00
tennc
f56a2e26ef update source lpl38-com webshell
Please check it
2014-03-12 08:50:59 +08:00
tennc
c04733c2d4 RadHat-webshell-del-backdoor
T00ls论坛Gu3st去后门版,请自行甄别
2014-03-12 08:42:14 +08:00
tennc
feeb07164b update asp shell
update mumaasp.com shell
2013-11-09 15:00:44 +08:00
tennc
f6d0a357d2 update asp webshell
404 team asp webshell
2013-10-29 17:20:22 +08:00
tennc
3e06df61e5 update asp shell
a asp shell bypass safedog
2013-10-18 08:17:22 +08:00
tennc
98001733fa update 3 spy
aspx php  jsp 3 spy
2013-10-12 11:18:33 +08:00
tennc
ea6306d16f update
r00ts shell
2013-09-20 17:07:46 +08:00
tennc
15cd7ad231 update 2013-09-06 08:38:12 +08:00
tennc
9db4327d81 update 2013-06-10 15:05:53 +08:00
tennc
733618bc2a update webshell Penetration testing2013 beta 2013-05-24 08:23:49 +08:00