Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/czz1233/GBByPass
冰蝎 哥斯拉 WebShell bypass
https://github.com/czz1233/GBByPass
Last synced: 21 days ago
JSON representation
冰蝎 哥斯拉 WebShell bypass
- Host: GitHub
- URL: https://github.com/czz1233/GBByPass
- Owner: czz1233
- Created: 2022-03-16T09:14:19.000Z (over 2 years ago)
- Default Branch: master
- Last Pushed: 2022-03-18T12:47:23.000Z (over 2 years ago)
- Last Synced: 2024-08-05T17:35:57.548Z (4 months ago)
- Language: Java
- Homepage:
- Size: 207 KB
- Stars: 659
- Watchers: 14
- Forks: 104
- Open Issues: 6
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - czz1233/GBByPass - 冰蝎 哥斯拉 WebShell bypass (Java)
- StarryDivineSky - czz1233/GBByPass
README
```
*************************警 告*****************************
本工具旨在帮助企业快速定位漏洞修复漏洞,仅限授权安全测试使用!
严格遵守《中华人民共和国网络安全法》,禁止未授权非法攻击站点!
***********************************************************1、Godzilla java_aes_raw连接默认密码为:1
2、Behinder默认密码为:Tas9er
3、生成绕过阿里云检测 http://XXX:8080/test.jsp?cmd=whoami[+]Loading Random Algorithm......
[+]Checking Coding Compliance......
[+]Creating Local File......
[+]输入1生成Godzilla;
[+]输入2生成Behinder;
[+]输入3生成绕过阿里云检测一句话:
```# 已添加绕过阿里云检测-命令执行
http://xxx:8080/test.jsp?cmd=whoami
![](images/demoali.png)
## 阿里云检测结果
![](images/passali.png)
# GBByPass
冰蝎 哥斯拉 webshell bypass 原理通过Unicode编码绕过关键字
# 更新哥斯拉
## 哥斯拉效果图
![](images/godz.png)
## 360
![](images/360.png)
## 火绒
![](images/fir.png)
## virustotal
![](images/img.png)
## webdir+
![](images/webdir+.png)## Stargazers over time
[![Stargazers over time](https://starchart.cc/czz1233/GBByPass.svg)](https://starchart.cc/czz1233/GBByPass)