FileGPS : A Tool That Help You To Guess How Your Shell Was Renamed

FileGPS is a tool that uses various techniques to find the new filename, after the server-side script renamed and saved it.

When you upload a shell on a web-server using a file upload functionality, usually the file get renamed in various ways in order to prevent direct access to the file, RCE and file overwrite.

Some of the techniques used by fileGPS are:

  • Various hash of the filename
  • Various timestamps tricks
  • Filename + PHP time() up to 5 minutes before the start of the script
  • So many more

Features

  • Easy to use
  • Multithreaded
  • HTTP(s) Proxy support
  • User agent randomization
  • Over 100.000 filenames combinations

Also Read – EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail + Password

Installation

On ParrotOS:

sudo apt install filegps

On BlackArch Linux:

pacman -S filegps

On other distros:

git clone https://github.com/0blio/filegps

How to write a module

Writing a module is fairly simple and allows you to implement your custom ways of generating filename combinations.

Below is a template for your modules:

#!/usr/bin/env python
#-*- coding: utf-8 -*-
“””
Module name: test
Coded by: Your name / nickname
Version: X.X
Description:
This module destroy the world.
“””
output = []
#Do some computations here
output = [“filename1.php”, “filename2.asp”, “filename3.jar”]

The variables url and filename are automatically imported from the core script, so you can call them in your module.

Once you finished to write your module, you have to save it in Modules/, and it will be automatically imported once the main script is started.

You can use the module shame as a template for your modules.

Credit; michele.cisternino@protonmail.com

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 day ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago