Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Seraphice/GBByPass

Folders and files

NameName
Last commit message
Last commit date

Latest commit

History

25 Commits

Repository files navigation

*************************警 告*****************************
本工具旨在帮助企业快速定位漏洞修复漏洞,仅限授权安全测试使用!
严格遵守《中华人民共和国网络安全法》,禁止未授权非法攻击站点!
***********************************************************
1、Godzilla java_aes_raw连接默认密码为:1
2、Behinder默认密码为:Tas9er
3、生成绕过阿里云检测 http://XXX:8080/test.jsp?cmd=whoami
[+]Loading Random Algorithm......
[+]Checking Coding Compliance......
[+]Creating Local File......
[+]输入1生成Godzilla;
[+]输入2生成Behinder;
[+]输入3生成绕过阿里云检测一句话:

已添加绕过阿里云检测-命令执行

http://xxx:8080/test.jsp?cmd=whoami

阿里云检测结果

GBByPass

冰蝎 哥斯拉 webshell bypass 原理通过Unicode编码绕过关键字

更新哥斯拉

哥斯拉效果图

360

火绒

virustotal

webdir+

Stargazers over time

Stargazers over time

About

冰蝎 哥斯拉 WebShell bypass

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Java 100.0%

AltStyle によって変換されたページ (->オリジナル) /