Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/l3m0n/Bypass_Disable_functions_Shell
一个各种方式突破Disable_functions达到命令执行的shell
https://github.com/l3m0n/Bypass_Disable_functions_Shell
Last synced: about 2 months ago
JSON representation
一个各种方式突破Disable_functions达到命令执行的shell
- Host: GitHub
- URL: https://github.com/l3m0n/Bypass_Disable_functions_Shell
- Owner: l3m0n
- Created: 2016-05-31T05:47:32.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2023-10-17T04:35:59.000Z (about 1 year ago)
- Last Synced: 2024-10-14T10:21:50.092Z (about 2 months ago)
- Language: PHP
- Size: 27.3 KB
- Stars: 1,181
- Watchers: 28
- Forks: 258
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- favorite-link - 一个各种方式突破 Disable_functions 达到命令执行的 shell。
- awesome-hacking-lists - l3m0n/Bypass_Disable_functions_Shell - 一个各种方式突破Disable_functions达到命令执行的shell (PHP)
README
# Bypass Disable Functions Shell
项目旧文档已迁移到[此处](https://github.com/l3m0n/Bypass_Disable_functions_Shell/blob/master/paper/readme.old.md)
禁用函数列表(希望能做最全的禁用列表,也可以用此做对比进行绕过):
```
dl,exec,system,passthru,popen,proc_open,pcntl_exec,shell_exec,mail,imap_open,imap_mail,putenv,ini_set,apache_setenv,symlink,link
```shell绕过已实现的方式:
- 常规绕过: exec、shell_exec、system、passthru、popen、proc_open
- ld_preload绕过: mail、imap_mail、error_log、mb_send_mail
- pcntl_exec
- imap_open
- fastcgi
- com
- apache mod-cgi目录结构:
- env - docker环境, 用于测试各类绕过exp
- papar - bypass原理
- exp - bypass脚本