Godzilla Reflection AES Plugin with Data‑Flow Break: A Webshell Generator that Evades Detection

The article introduces VeilShell, a Godzilla‑based reflection AES encryptor combined with a Data‑Flow Break and dynamic callback technique to generate PHP webshells, presents detailed evasion test results against Changting, Alibaba and VirusTotal scanners, and provides performance metrics and a GitHub link for acquisition.

Black & White Path
Black & White Path
Black & White Path
Godzilla Reflection AES Plugin with Data‑Flow Break: A Webshell Generator that Evades Detection

Tool Overview

VeilShell combines a Godzilla‑based reflection AES encryptor with a PHP webshell that uses AES encryption, gzdeflate compression, and a Data‑Flow Break technique to disguise communication.

Evasion Evaluation

The payload was fine‑tuned on a 30 000‑sample webshell dataset using the Qwen2‑0.5B‑Instruct model. After fine‑tuning, the small model did not flag the payload, and the payload evaded detection by the Changting and Alibaba webshell scanners as well as VirusTotal.

Test metrics: {'test_loss': 0.08689013123512268, 'test_accuracy': 0.973571192599934, 'test_f1': 0.9750623441396509, 'test_precision': 0.993015873015873, 'test_recall': 0.9577464788732394, 'test_runtime': 71.2095, 'test_samples_per_second': 42.508, 'test_steps_per_second': 2.668, 'epoch': 1.0}

Scanner Results

Detection outcomes for Changting, Alibaba and VirusTotal are shown in the following images.

Changting result
Changting result
Alibaba result
Alibaba result
VirusTotal result
VirusTotal result

Dataset Reference

The full training set is hosted at https://huggingface.co/datasets/nbuser32/PHP-Webshell-Dataset.

Connection Details

Normal connection environment screenshots are provided.

Connection environment
Connection environment

POST Example

An example POST request is illustrated.

POST example
POST example

Acquisition

Repository: https://github.com/e1arth/Godzilla_bypass_webshell

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

AES encryptionsecurity researchWebshellData-Flow BreakDetection EvasionGodzilla
Black & White Path
Written by

Black & White Path

We are the beacon of the cyber world, a stepping stone on the road to security.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.