All Projects → WhiteWinterWolf → Wwwolf Php Webshell

WhiteWinterWolf / Wwwolf Php Webshell

Licence: gpl-3.0
WhiteWinterWolf's PHP web shell

Projects that are alternatives of or similar to Wwwolf Php Webshell

Gtfonow
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-53.74%)
Mutual labels:  unix, pentesting
Milky
A .NET Standard library for pentesting web apps against credential stuffing attacks.
Stars: ✭ 49 (-66.67%)
Mutual labels:  pentesting, webapp
HOUDINI
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
Stars: ✭ 791 (+438.1%)
Mutual labels:  webapp, pentesting
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-28.57%)
Mutual labels:  pentesting, webapp
Burpsuite Xkeys
A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-2.04%)
Mutual labels:  pentesting
Sqlite Lab
This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is for fun. Just enjoy it \m/
Stars: ✭ 140 (-4.76%)
Mutual labels:  pentesting
Webcell
Web Components engine based on JSX & TypeScript
Stars: ✭ 139 (-5.44%)
Mutual labels:  webapp
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-8.16%)
Mutual labels:  pentesting
Alize
Visualize Your Github Profile
Stars: ✭ 148 (+0.68%)
Mutual labels:  webapp
Ha4iot
Open Source Home Automation system for .NET
Stars: ✭ 146 (-0.68%)
Mutual labels:  webapp
Oksh
Portable OpenBSD ksh, based on the Public Domain Korn Shell (pdksh).
Stars: ✭ 142 (-3.4%)
Mutual labels:  unix
Nami
A decentralized binary package manager.
Stars: ✭ 141 (-4.08%)
Mutual labels:  unix
Mida Multitool
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (-2.04%)
Mutual labels:  pentesting
Quiver
Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.
Stars: ✭ 140 (-4.76%)
Mutual labels:  pentesting
Simplemagic
Simple file magic number and content-type library which provides mime-type determination from files and byte arrays
Stars: ✭ 146 (-0.68%)
Mutual labels:  unix
Asciinema Player
asciinema player is an open-source terminal session player written in Javascript and Rust/WASM. Unlike other video players asciinema player doesn't play heavy-weight video files (.mp4, .webm etc) and instead plays light-weight terminal session files called asciicasts.
Stars: ✭ 1,948 (+1225.17%)
Mutual labels:  unix
App Privacy Policy Generator
A simple web app to generate a generic privacy policy for your Android/iOS apps
Stars: ✭ 2,278 (+1449.66%)
Mutual labels:  webapp
Wincmdfu
Windows one line commands that make life easier, shortcuts and command line fu.
Stars: ✭ 145 (-1.36%)
Mutual labels:  pentesting
Fuxploider
File upload vulnerability scanner and exploitation tool.
Stars: ✭ 1,997 (+1258.5%)
Mutual labels:  pentesting
Smcroute
Static multicast routing for UNIX
Stars: ✭ 140 (-4.76%)
Mutual labels:  unix

wwwolf's PHP web shell

I frequently encountered issues when using other web shells:

  • They use new PHP syntax features not compatible with the old PHP version running on some targets.
  • They make wrong assumption on the remote URL, breaking PHP code injection or GET parameters (un)expected by the server.
  • They often only display standard output content, throwing away stderr.
  • They poorly handle special characters in output display (such as <).
  • They do not allow file upload, or offer a method unsupported/blocked by the target's settings.
  • They require manual modification depending whether the target is running a UNIX-like or a Windows system.

Here is my attempt to solve these issues. As opposed to some other solutions, this one does not even barely aim to become a "full-featured post-exploitation framework". It's only goal is to provide a stable and reliable way to get a foot in the door on the target by adhering to the KISS principle as much as possible and staying generic enough to let you build what you want from there without getting in your way.

WhiteWinterWolf's PHP web shell screenshot

WhiteWinterWolf's PHP web shell:

  • Access can be password protected.
  • Is compatible with both UNIX-like and Windows systems with no modification.
  • Attempts to clear PHP output buffer (ie. drop any "garbage" code already produced by the attacked application) and enforce PHP code execution termination to provide the most clean and stable behavior.
  • The form is submitted as a POST requests keeping the exact same URL (including the exact same GET parameters, nothing added or removed) which has been used to access it in the first place. No assumption is made, making it suitable for twisted code injection techniques. Moreover the remote server may not log POST data, and thus may not log the actual commands execute on the target.
  • Sensible default values are applied:
    • The current working directory is set to the actual current working directory. This has the added advantage of easily telling you the remote system-type (/var/www/html vs. C:\Inetpub\wwwroot).
    • The fetch source host is set to your IP address as seen from the targeted server.
  • You can freely set the working directory and the value is kept among commands. A specific warning message is displayed in case PHP's open_basedir setting may limit your ability to move throughout the server.
  • There is two different ways to upload files to your targets:
    • A classical upload form if the remote PHP settings allows it.
    • Fetch the file from a given host and URL (usually a host controlled by the attacker). This feature implement a very basic HTTP fetch functionality allowing to circumvent PHP's url_allow_fopen setting limitation. It does not handle fancy things like HTTP redirection or authentication, but may still handle SSL/TLS by prepending the hostname accordingly (tls://203.0.113.37).
  • A link Clear cmd allows to clear and set the focus on the command input form field in a single click. I find it convenient to quickly execute a few arbitrary commands on the server but this feature relies on JavaScript. If you want to avoid JavaScript you can remove this single-line, this will not affect the rest of the web shell which does not use JavaScript anywhere else.

This script applies the form settings in the given order:

  1. Current working directory.
  2. Files to upload.
  3. Command to execute.

This allows to upload a file in a given directory and immediately execute it in a single HTTP request.

More information can be found on the main project page.

This script is provided only for security research and assessment purposes. Do not use it for anything illegal!

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].