Explore tweets tagged as #WebShells
A misconfigured public PHP upload page on a Linux server allowed upload of obfuscated web shells and mailer scripts. Missing EDR, unpatched CVEs, and poor logging hindered detection. #WebShells #UploadSecurity #Varonis.
0
0
0
#opendir hosting #CobaltStrike #webshells and #shellcode loader. 152.32.170.129 ๐ญ๐ฐ. 121.exe and 12.exe (both CobaltStrike) connect to 152.42.226.16 ๐ธ๐ฌ for C2. Interesting payload hosted in Sqlite database (also CobaltStrike)
1
12
72
NEW LAB: Mustang Panda ๐ผ๐. Chinese cyber espionage APT targeting a government body across the U.S, Europe, and APAC. Test your blue team skills on.๐ .NET malware.๐ DLL Sideloading.๐ Webshells .๐ Procdumps. Lab Contributors.Adversarial Emulation: @MDSecLabs @offensiveninja
6
83
434
SharePoint situational update: In collaboration with @ValidinLLC & @certbund we improved vhost & version detection of SharePoint instances, resulting in ~17K IPs observed exposed. 840 with CVE-2025-53770 - version based detection only. At least 20 with webshells.
1
12
26
I went and extracted keywords from all the known knowns of webshells ๐. I then popped them into an array ๐ and added a special twist ๐ to our output in #ShellSweep ๐ฅ. Note ๐: Some of the false positives (FPs) in the Mixed Mode shot there. 'Mixed' is using a lower value for
1
8
35
Webshell ุจุดูู ู
ูุฌุฒ ู
ุน ุฎุทูุงุช ุชูุถุญ ูู ููู ูุชู
ุงูุชุดุงูู ูู
ุญูู ุงู
ู ุณูุจุฑุงูู . ูู ุนุจุงุฑุฉ ุนู ุจุฑูุงู
ุฌ ูุตู ุฃู ุจุฑูุงู
ุฌ ุถุงุฑ ูุชู
ุชุญู
ููู ุฅูู ุฎุงุฏู
ููุจ Web Server ู
ุฎุชุฑูุ .ู
ู
ุง ูุณู
ุญ ููู
ูุงุฌู
ุจุงููุตูู ุบูุฑ ุงูู
ุตุฑุญ ุจู ูุงูุชุญูู
ูู ุงูุฎุงุฏู
. ุบุงูุจูุง ู
ุง ูุณุชุฎุฏู
ุงูู
ูุงุฌู
ูู Webshells ูุชูููุฐ ุฃูุงู
ุฑ ุนุดูุงุฆูุฉ ูู
ุนุงูุฌุฉ
1
29
182
ุชุฌููุฏ ูููุงูุฑุฒ ุนูู ุงูุนูู ๐. ุชู
ุงูุชูุงุตู ู
ุนู ู
ู ูุจู ุดุฎุต ูุญุงูู ุชุฌููุฏ ุฃูุฑุงุฏ ูู ู
ุฌุงู #ุงูุฃู
ู_ุงูุณูุจุฑุงูู ูุงุฎุชุฑุงู ู
ูุงูุน ุฅููุชุฑูููุฉ ู
ุณุฌููุฉ ูู ุงูุตููุ ู
ูุงุจู ุฑุงุชุจ ุดูุฑู ูุฏ ูุตู ุฅูู 100,000 ุฏููุงุฑ. ุทูุจ ู
ูู ุฅุซุจุงุช ุงููุฏุฑุฉ ุนุจุฑ ุฒุฑุน 3 webshells ุญููููุฉ ูู ูุทุงูุงุช ุตูููุฉุ ูุจู ู
ูุงูุดุฉ ุชูุงุตูู โุงูุชุนุงูู ุทููู
3
15
34
Hackers are hitting ASP . Net apps, exploiting exposed MachineKeys for RCE and stealthy webshells like Godzilla. Theyโre pivoting fast to tools like Cobalt Strike and chasing privilege escalation. Scan, patch, stay ahead. #CyberSecurity #KudelskiSecurity
0
2
3
Update: See newly added info to our #ToolShell Alert. Weโve included info on ransomware deployment, new webshells involved in exploitation, & detection guidance ๐
3
38
75