# webshell-detect-bypass **Repository Path**: vantler/webshell-detect-bypass ## Basic Information - **Project Name**: webshell-detect-bypass - **Description**: 绕过专业工具检测的Webshell研究文章和免杀的Webshell - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 1 - **Created**: 2021-01-25 - **Last Updated**: 2021-02-26 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README ## Webshell-Detect-Bypass **此项目用来存放我绕过专业工具检测的Webshell研究文章和免杀的Webshell源码.** ### 免责声明 ``` 1. 在对方未授权的情况下,直接或间接利用本项目涉及到的 webshell 研究样本攻击目标是违法行为. 2. 本项目涉及到的 webshell 仅为安全研究和授权情况下使用,其使用人员有责任和义务遵守当地法律条规. 3. 本项目涉及到的 webshell 样本及文章仅为促进安全防御研究使用,研究人员对因误用该程序造成的资产损坏和损失概不负责. ``` ### Articles - [**php一句话木马检测绕过研究**](https://github.com/LandGrey/webshell-detect-bypass/tree/master/docs/php-webshell-detect-bypass/php-webshell-detect-bypass.md) - [**利用Java反射和类加载机制绕过JSP后门检测**](https://github.com/LandGrey/webshell-detect-bypass/tree/master/docs/using-java-reflection-and-ClassLoader-bypass-webshell-detection/using-java-reflection-and-ClassLoader-bypass-webshell-detection.md) - [**构造免杀的asp一句话木马**](https://github.com/LandGrey/webshell-detect-bypass/tree/master/docs/asp-webshell-detect-bypass/asp-webshell-detect-bypass.md) - [**菜刀HTTP流量中转代理过WAF**](https://github.com/LandGrey/webshell-detect-bypass/tree/master/docs/china-chopper-http-proxy/china-chopper-http-proxy.md) - [**基于内存 Webshell 的无文件攻击技术研究**](https://github.com/LandGrey/webshell-detect-bypass/tree/master/docs/spring-inject-webshell/spring-inject-webshell.md) ### Webshells - #### [php](https://github.com/LandGrey/webshell-detect-bypass/tree/master/webshell/php) - #### [jsp](https://github.com/LandGrey/webshell-detect-bypass/tree/master/webshell/jsp) - #### [asp](https://github.com/LandGrey/webshell-detect-bypass/tree/master/webshell/asp)