Explore tweets tagged as #WebShell
Beginners looking at this: Again IIS 🤦♂️ Others: Time to hack :) Popular endpoints: /aspnet_client /trace.axd /global.asax Try target[.]com/><img> Often discloses info. Also, check if PUT method is enabled, if yes, then try uploading .aspx webshell or web.config.
5
90
578
In memory react4shell webshell. 🤌Stolen from https://t.co/KBkFFAvvPy and dropped into go-exploit framework.
0
24
118
Actor mass exploiting CVE-2025-31324 (SAP Netweaver RCE) from 45.15.140.117 ( Pq Hosting Plus S.r.l. ) 🇳🇿 VirusTotal Detections: 0/94 🟢 Payload contains an obfuscated webshell 📷
0
10
29
I used a PHP webshell hidden in a 404 error page to maintain access on a breached server.
7
25
202
An attacker downloaded a freely available webshell from GitHub and stored it under the installation path of the legitimate SAP installation in the recent SAP Visual Composer exploitation, "disguised" as a PHPMyAdmin file (see image). The code itself is relatively simple,
4
23
99
#webshell #opendir #netsupport #rat at: https://appointedtimeagriculture\.com/wp-includes/blocks/post-content/ GatewayAddress=95.179.158.213:443 RADIUSSecret=dgAAAPpMkI7ke494fKEQRUoablcA
2
7
27
Tracking down a rogue Windows service for webshell persistence -- just a teeny weeny PowerShell HTTP server wrapped with NSSM, showcased with Wazuh and their sweet new 4.14 release with visibility on IT hygiene 😎 Video: https://t.co/rQk6rV5dNg
4
59
389
VulnCheck is releasing our in-memory webshell for #React2Shell, along with our initial access intelligence team's observations on variants, the public PoC ecosystem, detection challenges, potential payload modifications, and more. https://t.co/3LOL9QETtC
1
3
12
That SharePoint thing is so bad. Attackers don't deploy a webshell or smth. They leak a core sensitive key of the system allowing to validly sign certain request. Even if you patch the instance, attacks still can use the keys in the future. Only rotating the Keys will fix that...
0
7
47
Today i found a RCE in a bug bounty platform 1. found a bypass admin role with cve confluence 2. access and upload a plugin ( webshell) 3. turn on plugin in server and can run any system command HOPY THEY FAIR #BugBounty
8
14
168
Spring4Shell RCE vulnerability... this was identified as a bypass of the patch for "CVE-2010-1622" the vulnerability allows attackers to upload a "webshell" to the vulnerable server, achieving remote command execution. "Where there's a patch, there's a bypass"
5
15
123
A webshell that went undetected for years — #nextronresearch detection rules caught it early — and they keep getting better. 🧬 SHA-256: 6137386a6210c13153f540c9c9ae0625520f72ddae0412c5c636fed483b1c29c Make sure you're not already compromised — run a scan with thor.
2
4
30
6.مثال WebShell بسيط يعطيك RCE (تشغيل أوامر): نسوي ملف ثاني اسمه webshell.php ونحط: <?php system($_GET['cmd']); ?> نرفعه. لو انقبل، نروح للرابط: uploads/webshell.php?cmd=id/ وبيتنفّذ الأمر مباشرة. نقدر نبدّل id بأي أمر نبيه. لو اشتغل → عندك RCE كامل.
1
0
2