Explore tweets tagged as #ShellSweep
ShellSweep. A PowerShell/Python/Lua tool designed to detect potential webshell files in a specified directory. #cybersecurity #infosec #pentesting
0
11
57
🚀 ShellSweep Update Alert! 🚀. Big thanks to @nas_bench for this 🔥 PR with exciting updates:. 1️⃣ Applied black formatting to Python, Lua, and PowerShell scripts. 🖤.2️⃣ Revamped directory structure with dedicated folders for ShellSweep & ShellSweepPlus. 📂.3️⃣ Added a Python
0
7
17
🤓 Been geeking out on this and I think it's a prime time to share. Still adding some features before the grand release for both #ShellSweep and #ShellSweepML. 🌟 Checkout this StreamLit App for #ShellSweepML:. 🔄 Feedback loop built-in: allows for correcting false negatives and
2
2
15
Come hang out and see some fresh ShellSweep tomorrow on #AtomicsonaFriday- going to nerd on some web shells and some other things I'm sure!.
2
4
11
Another addition to the ShellSweep collection? Heck yes. The Splunk Threat Research Team is back with ShellSweepX, giving you more insights on how incident responders can take hunting web shells to the next level. Catch it on #SplunkBlogs: #SplunkSecurity
1
4
12
The stealthy nature of web shells poses a substantial threat to server and system security. Enter: ShellSweep. 🐚 Head to #SplunkBlogs to learn more about this suite of utilities designed to detect and combat malicious web shells: #SplunkSecurity
0
3
7
⚔️ 🛡️Ran the samples through . CVE-2025-53770 fun. 🤩. Entropy/stdev of these would fire on base ShellSweep runs. Easy stuff to catch.
If you’re tracking the AV detection rate for the web shells dropped in recent SharePoint attacks (CVE-2025-53770), here’s the current picture:. Samples:.27c45b8ed7b8a7e5fff473b50c24028bd028a9fe8e25e5cea2bf5e676e531014
1
8
34
I also created a VT Collection of the shells I've been working with. This is all the hashes I collected - 2769 total. Entropy distribution also aligns very well with some of the values originally used with #ShellSweep. Just more hype! Release soon ™️
0
5
21