Find file History
amuntner Tiny php remote os commanding backdoor
Example usage:

http://host/?c=id
Latest commit 837c737 Oct 17, 2016
Permalink
Type Name Latest commit message Commit time
..
Failed to load latest commit information.
asp from laudanum-1.0 Mar 10, 2016
c webshells Apr 22, 2010
cfm from laudanum-1.0 Mar 10, 2016
exe webshells Apr 22, 2010
jsp Create MANIFEST.MF Mar 10, 2016
php Tiny php remote os commanding backdoor Oct 16, 2016
pl-cgi webshells Apr 22, 2010
servlet webshells Apr 22, 2010
sh webshells Apr 22, 2010
wordpress Added files via upload Mar 10, 2016
README.md add link to webshell git repo Oct 10, 2016

README.md

Web backdoors from the wild, collected during incident response, submitted, and acquired otherwise.

Antivirus/antimalware bypass: Most antivirus/antimalware/waf/ids/etc will flag on these immediately, deleting a payload that otherwise could have been successfully uploaded. Basic evasion techniques are likely to work. Try modifying the code so that it's different enough to not trigger pattern-based signatures. Examples - delete comments, replace function names, replace variable names.

This repo has many more: https://github.com/xl7dev/WebShell


Laudanum-1.0 files credits: