FileGPS : A Tool That Help You To Guess How Your Shell Was Renamed

FileGPS is a tool that uses various techniques to find the new filename, after the server-side script renamed and saved it.

When you upload a shell on a web-server using a file upload functionality, usually the file get renamed in various ways in order to prevent direct access to the file, RCE and file overwrite.

Some of the techniques used by fileGPS are:

  • Various hash of the filename
  • Various timestamps tricks
  • Filename + PHP time() up to 5 minutes before the start of the script
  • So many more

Features

  • Easy to use
  • Multithreaded
  • HTTP(s) Proxy support
  • User agent randomization
  • Over 100.000 filenames combinations

Also Read – EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail + Password

Installation

On ParrotOS:

sudo apt install filegps

On BlackArch Linux:

pacman -S filegps

On other distros:

git clone https://github.com/0blio/filegps

How to write a module

Writing a module is fairly simple and allows you to implement your custom ways of generating filename combinations.

Below is a template for your modules:

#!/usr/bin/env python
#-*- coding: utf-8 -*-
“””
Module name: test
Coded by: Your name / nickname
Version: X.X
Description:
This module destroy the world.
“””
output = []
#Do some computations here
output = [“filename1.php”, “filename2.asp”, “filename3.jar”]

The variables url and filename are automatically imported from the core script, so you can call them in your module.

Once you finished to write your module, you have to save it in Modules/, and it will be automatically imported once the main script is started.

You can use the module shame as a template for your modules.

Credit; michele.cisternino@protonmail.com

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

3 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

3 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

2 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

3 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago