ScanWebshell
Webshell Scanner Detector. To play!
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
#!usr/bin/perl
# ###################
# # ScanWebshell #
############################################X###########
# ##
# ___________ _____ .__ #
# \_ _____/______ / | |______ | |__ #
# | __) \_ __ \/ | |\____ \| | \ #
# | \ | | \/ ^ / |_> > Y \ #
# \___ / |__| \____ || __/|___| / #
# \/ |__||__| \/ ##
# ##
# Independent Security Researcher ##
# Copyright - Jose Pino (@Fr4phc0r3) ##
# contact: jfraph@gmail.com #########
# ## V1.0 #
##################################################################
#
## #----->>>|Fraph|===============>
####################################### ==> Detected.
## #----->>>(Analisis...)====>
###########################
$Developed = "Fraph"; #
$Twitter = "@Fr4phc0r3"; #
$Version = "1.0"; #
###########################
use LWP::UserAgent;#
####################
my @diccionario = ('Crazyshell.php','securitypwn.php','C4nh0t0.php','superhacker.php','Dr_SHA6H.php','DrSHA6H.php','WorseLinuxShell.php','ru24_post_sh
.php','RemExp.php','RemExp.asp','r57shell.php','r57_Mohajer22.php','r57_iFX.php','Priv8shell.php','Private-i3lue.php','Predator.php','PHPJackal.php'
,'pHpINJ.php','php-include-w-shell.php','php-backdoor.php','PHANTASMA.php','PHVayv.php','NTDaddy.php','nshell.php','mysql_tool.php','MyWShell.php'
,'MyShell.php','matamu.php','Loaderz.php','LoaderzWEBShell.php','ShellDDos.php',
'load_shell.php','Liz0ziM.php','wp-db.php','WP-DB.php','hackerarmy.php','teamhacker.php','lamashell.php','klasvayv.php','klasvayv.asp','KAdot.php'
,'kacak.php','KA_uShell.php','FTPSHELL.php','FTPSHELL.php','JspWebshell.php','iMHaBiRLiGi.php','hiddensshell.php','go-shell.php','gfs_sh.php',
'Gamma.php','GammaWebShell.php','Elmaliseker.php','sym/jaguar.izri','jaguar.izri','jaguar.php','hackzone.php','m4y4.php','therules25.php','cracker_cpa
nel.php','cpanel_cracker.php','ELMALISEKER.php','ekin0x.php','EFSO_2.php','DxShell.php');
my $nyan=HTTP::Request->new(GET=>$fr4ph);
my $nyan = LWP::UserAgent->new("Mozilla/5.0 (Windows NT 6.1; rv:23.0) Gecko/20100101 Firefox/23.0"); #Firefox
#Firefox:>> Mozilla/5.0 (Windows; U; Windows NT 5.1; nl; rv:1.8.1.12) Gecko/20080201Firefox/2.0.0.12
$nyan->agent("Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/29.0.1547.66 Safari/537.36"); #Chrome
$nyan->timeout(6);
vista();
print "Ingresa La Url ==> ";
chomp( my $sitio = <stdin> );
if ( $sitio !~ /^http:/ ) {
$sitio = 'http://' . $sitio;
}
if ( $sitio !~ /\/$/ ) {
X
Url: https://github.com/Fraph/ScanWebshell/blob/master/scanwebshell.pl
Language: Perl | User: Fraph | Created: Nov 4, 2013 | Tags: ScanWebshell Perl Fraph Detected