DAws – New Big Release – 22/5/2015

About
There’s multiple things that makes DAws better than every Web Shell out there:

  1. Bypasses Security Systems using various methods.
  2. Drops CGI Shells and communicate with them to bypass Security Systems.
  3. Uses the SSH Authorized Keys method to bypass Security Systems.
  4. Uses Shellshock to bypass Security Systems.
  5. Is completely Post Based and uses a XOR Encryption based on a random key that gets generated with every new session + private base64 functions to bypass Security Systems.
  6. Supports Windows and Linux.
  7. Find a writeable and readable directory and moves there if it’s a web directory.
  8. Drops a php.ini and a .htaccess file that clears all disablers incase “suphp” was installed.
  9. Has an advanced File Manager
  10. Mostly everything is done automatically (when it comes to command or script execution)
  11. Open Source
  12. and much more (check the source for more information; everything is well commented)

Github:
https://github.com/dotcppfile/DAws/

How does Xpath Injection Work + Modifications – Explained

Hello everyone,

Well it’s been a while since I’ve posted something so here we go.

I’ve been in a lot of different hacking communities for a long time and as usual most of them are filled with skids that would only memorize the queries shared by others, so if you’re one of these ones looking for a “new l337 query to hax0r everybody” then get out of here.
Continue reading “How does Xpath Injection Work + Modifications – Explained”

Design a site like this with WordPress.com
Get started