Tagged articles
14 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 30, 2026 · Information Security

Bypassing Webshell Detection with Branch‑Based Obfuscation and Puzzle Logic

This article explains how a PHP webshell can evade antivirus and sandbox detection by embedding a branch‑based puzzle (InazumaPuzzle) that manipulates block states, combines it with a PerlinNoise class to construct a hidden system() call, and demonstrates the step‑by‑step execution using the input sequence ABBCCD.

BypassObfuscationPHP
0 likes · 36 min read
Bypassing Webshell Detection with Branch‑Based Obfuscation and Puzzle Logic
Black & White Path
Black & White Path
Mar 14, 2026 · Information Security

Godzilla Reflection AES Plugin with Data‑Flow Break: A Webshell Generator that Evades Detection

The article introduces VeilShell, a Godzilla‑based reflection AES encryptor combined with a Data‑Flow Break and dynamic callback technique to generate PHP webshells, presents detailed evasion test results against Changting, Alibaba and VirusTotal scanners, and provides performance metrics and a GitHub link for acquisition.

AES encryptionData-Flow BreakDetection Evasion
0 likes · 3 min read
Godzilla Reflection AES Plugin with Data‑Flow Break: A Webshell Generator that Evades Detection
Java Architect Essentials
Java Architect Essentials
May 26, 2023 · Information Security

Step‑by‑Step WordPress Site Penetration Testing Tutorial

This tutorial walks beginners through the entire process of compromising a WordPress website, from initial information gathering and DNS enumeration to vulnerability scanning, exploitation with tools like sqlmap and nmap, privilege escalation, and establishing persistent backdoors.

SQLMapWebshellWordPress
0 likes · 10 min read
Step‑by‑Step WordPress Site Penetration Testing Tutorial
MaGe Linux Operations
MaGe Linux Operations
May 21, 2023 · Information Security

Step‑by‑Step Webshell Upload and Kernel Privilege Escalation on Ubuntu 16.04

This tutorial walks through setting up an Ubuntu 16.04 vulnerable environment, gathering information, uploading a webshell via MySQL into outfile or log injection, establishing a reverse shell with Metasploit, and finally exploiting CVE‑2021‑4034 for kernel privilege escalation, while also covering post‑exploitation persistence techniques.

KaliLinuxMetasploit
0 likes · 10 min read
Step‑by‑Step Webshell Upload and Kernel Privilege Escalation on Ubuntu 16.04
Laravel Tech Community
Laravel Tech Community
Oct 9, 2022 · Information Security

PHP One‑Liner Webshells and Evasion Techniques

This article explains various one‑line PHP webshell payloads, compares eval and assert functions, and demonstrates multiple obfuscation methods such as XOR, base64, rot13, concatenation, custom function wrappers, variable variables, class‑based tricks, and version‑specific payloads to bypass WAFs and antivirus detection.

EvasionObfuscationPHP
0 likes · 12 min read
PHP One‑Liner Webshells and Evasion Techniques
MaGe Linux Operations
MaGe Linux Operations
Oct 1, 2022 · Information Security

Mastering PHP One‑Line Webshell Evasion: Techniques & Payloads

This article explores various PHP one‑line webshell payloads, compares eval and assert functions, and presents multiple evasion techniques such as XOR, base64, rot13, string concatenation, variable obfuscation, and version‑specific tricks to bypass WAFs and antivirus detection.

EvasionObfuscationOne-liner
0 likes · 16 min read
Mastering PHP One‑Line Webshell Evasion: Techniques & Payloads
MaGe Linux Operations
MaGe Linux Operations
Nov 15, 2021 · Backend Development

Building a Django WebShell with WebSockets, ASGI, and Paramiko

This guide walks through creating a WebShell that lets a React front‑end control a remote virtual machine via Django‑based WebSocket services, covering ASGI setup, custom WebSocket handling, integration with Paramiko for SSH, and a lightweight xterm.js terminal client.

ASGIDjangoParamiko
0 likes · 11 min read
Building a Django WebShell with WebSockets, ASGI, and Paramiko
Huolala Tech
Huolala Tech
Nov 11, 2020 · Information Security

How Red Team Techniques Uncover Phishing Attack Origins: A Step‑by‑Step Guide

This article demonstrates how red‑team methods can be applied to phishing traceability, detailing phishing classifications, email‑header extraction, malicious site analysis, web‑shell decryption, privilege‑escalation techniques, log mining, and attacker attribution to reconstruct the full attack chain.

Red TeamWebshellemail analysis
0 likes · 33 min read
How Red Team Techniques Uncover Phishing Attack Origins: A Step‑by‑Step Guide
ITFLY8 Architecture Home
ITFLY8 Architecture Home
May 9, 2018 · Information Security

Master MySQL Penetration: From Recon to Privilege Escalation

This article details comprehensive MySQL penetration techniques, covering information gathering, password cracking, webshell deployment, and multiple privilege‑escalation methods using tools such as Nmap, Metasploit, sqlmap, MOF, UDF and startup script exploits.

Information GatheringMetasploitSQLMap
0 likes · 25 min read
Master MySQL Penetration: From Recon to Privilege Escalation
21CTO
21CTO
Apr 30, 2016 · Information Security

How to Bypass PHP 7 OPcache File Restrictions with a Binary Webshell

This article explains the security flaws in PHP 7's OPcache engine, demonstrates a novel binary webshell attack that bypasses file‑write protections, and provides step‑by‑step exploitation techniques including file‑cache manipulation, memory‑cache bypass, and timestamp spoofing.

BypassFile CacheOPcache
0 likes · 11 min read
How to Bypass PHP 7 OPcache File Restrictions with a Binary Webshell