Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/fear2o/shellkill
an advanced python-based web shell uploader
https://github.com/fear2o/shellkill
bypass-shell bypass-waf cli cybersecurity exploit hacking payload penetration-testing python python-tool python3 rce rce-exploit security security-tool web-shell web-shell-upload
Last synced: 13 days ago
JSON representation
an advanced python-based web shell uploader
- Host: GitHub
- URL: https://github.com/fear2o/shellkill
- Owner: Fear2o
- License: mit
- Created: 2024-11-11T16:25:25.000Z (3 months ago)
- Default Branch: main
- Last Pushed: 2025-01-04T19:24:10.000Z (about 1 month ago)
- Last Synced: 2025-01-04T20:24:42.011Z (about 1 month ago)
- Topics: bypass-shell, bypass-waf, cli, cybersecurity, exploit, hacking, payload, penetration-testing, python, python-tool, python3, rce, rce-exploit, security, security-tool, web-shell, web-shell-upload
- Language: Python
- Homepage:
- Size: 3.21 MB
- Stars: 4
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- Contributing: CONTRIBUTING.md
- Funding: .github/FUNDING.yml
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
Awesome Lists containing this project
README
# 🐚 **ShellKill** 💀🔥
## Overview 📖
**ShellKill** is a Python tool designed to upload a **web shell** to a target server and trigger it using various **evasion techniques** to bypass file upload restrictions. A **web shell** is a script that provides remote access and control over a web server. By uploading a web shell, an attacker can execute commands on the target server, manipulate files, and potentially escalate privileges.The tool also supports **automatic retries**, file upload validation, and vulnerability scanning for common web vulnerabilities such as **File Upload issues, LFI/RFI, XSS**, and SQL Injection.
> **Warning:** This tool can potentially cause significant damage if misused. Only use it in controlled environments where explicit permission has been granted. 🚨
![GitHub stars](https://img.shields.io/github/stars/Fear2o/ShellKill?style=social)
![Build Status](https://img.shields.io/github/workflow/status/Fear2o/ShellKill/CI)
![License](https://img.shields.io/github/license/Fear2o/ShellKill)
![Contributors](https://img.shields.io/github/contributors/Fear2o/ShellKill)### 🚀 **Key Features:**
- **Shell File Upload**: Easily upload a web shell to a target server via a specified URL. ⚡
- **Retries and Error Handling**: Automatic retries on failure with detailed error logging for easy debugging. 🔄
- **Evasion Techniques**: Bypass file upload restrictions using creative methods like file renaming and base64 encoding. 🛡️
- **Vulnerability Scanning**: Automatically scan the target URL for common vulnerabilities like **File Upload issues**, **LFI/RFI**, **XSS**, and **SQL Injection**. 🔍
- **Customizable**: Configure retry count, proxies, and timeout settings with ease. 🛠️---
## 🚨 **Prerequisites** 🛠️
Before you begin, make sure you have:
- **Python 3.6+**: WebShellUploader is built for Python 3.6 and above. 🔑
---
## 📥 **Installation**
1. **Clone into the repository**
```python
git clone https://github.com/Fear2o/ShellKill
```2. **Move to its directory**
```bash
cd ShellKill
```## 📝 **Usage**
### Command-Line Arguments 🎯
- `target_url`: Target URL of the server you want to test. (e.g., `http://example.com`)
- `shell_file_path`: Path to the web shell you want to upload. 🗂️
- `upload_url`: The upload endpoint where the file should be uploaded. 📤
- `--proxies`: Optional argument to specify proxies. (e.g., `--proxies http://127.0.0.1:8080`)
- `--max_retries`: Set the maximum number of retries for the upload (default: `5`). 🔄
- `--evasion_techniques`: Enable or disable evasion techniques. Default is `True`. 🕶️
- `--timeout`: Set the timeout for requests in seconds (default: `10`). ⏳### 🖥️ **Example Command**
```bash
python ShellKill.py http://example.com /path/to/shell.php http://example.com/upload --max_retries 5 --evasion_techniques True --timeout 10
```## 📊 Logging & Reports 📜
All actions performed by **ShellKill** are logged into a rotating log file named upload_log.txt. Here's an example of what the logs might look like:
2024-11-10 12:34:56,789 - INFO - Target URL http://example.com is reachable.
2024-11-10 12:35:00,123 - INFO - Shell file /path/to/shell.php is valid and readable.
2024-11-10 12:35:05,456 - INFO - Attempting upload with renamed shell: shell_1234.php.
2024-11-10 12:35:10,789 - ERROR - Request failed (Attempt 1): Timeout error.
2024-11-10 12:35:15,123 - INFO - Shell uploaded successfully: /path/to/shell.php.
![Example](https://github.com/Fear2o/ShellKill/blob/main/assets/Example.PNG)## 📈 How to Contribute 💡
We welcome contributions to **ShellKill!** If you find bugs, have ideas for features, or want to help improve the project, please feel free to:
1. **Fork the repo 🍴**
2. **Create a feature branch 🌱**
3. **Submit a pull request 🚀**
We highly appreciate all contributions and feedback from the community!## ⭐ **Give It a Star!**
If you found this tool useful, please give it a ⭐ and **follow** for future updates. 🚀 Your support helps improve the tool and motivates the development of more awesome features!
[Star this repository on GitHub](https://github.com/Fear2o/ShellKill) ⭐
## **📌 Disclaimer ⚠️**
This tool is for **educational purposes only**. You must have **explicit permission** to test any web server. The author is not responsible for any illegal use or actions taken using this tool. **Use responsibly and ethically!** 💻
## **📚 License 🛡️**
This project is licensed under the **MIT License** - see the [LICENSE](https://github.com/Fear2o/ShellKill/blob/main/LICENSE)
file for more details. 📝## **🔔 Stay Updated 📰**
- Follow me on [GitHub](https://github.com/Fear2o) for the latest updates!
- Join the discussion and contribute to making **ShellKill** even better. 👥
### **🏅 Thank you for your support! 🙌**
Keep hacking responsibly and stay awesome! 😎---
*Crafted by Fear.io*