FileGPS : A Tool That Help You To Guess How Your Shell Was Renamed

FileGPS is a tool that uses various techniques to find the new filename, after the server-side script renamed and saved it.

When you upload a shell on a web-server using a file upload functionality, usually the file get renamed in various ways in order to prevent direct access to the file, RCE and file overwrite.

Some of the techniques used by fileGPS are:

  • Various hash of the filename
  • Various timestamps tricks
  • Filename + PHP time() up to 5 minutes before the start of the script
  • So many more

Features

  • Easy to use
  • Multithreaded
  • HTTP(s) Proxy support
  • User agent randomization
  • Over 100.000 filenames combinations

Also Read – EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail + Password

Installation

On ParrotOS:

sudo apt install filegps

On BlackArch Linux:

pacman -S filegps

On other distros:

git clone https://github.com/0blio/filegps

How to write a module

Writing a module is fairly simple and allows you to implement your custom ways of generating filename combinations.

Below is a template for your modules:

#!/usr/bin/env python
#-*- coding: utf-8 -*-
“””
Module name: test
Coded by: Your name / nickname
Version: X.X
Description:
This module destroy the world.
“””
output = []
#Do some computations here
output = [“filename1.php”, “filename2.asp”, “filename3.jar”]

The variables url and filename are automatically imported from the core script, so you can call them in your module.

Once you finished to write your module, you have to save it in Modules/, and it will be automatically imported once the main script is started.

You can use the module shame as a template for your modules.

Credit; michele.cisternino@protonmail.com

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

6 days ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

6 days ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

6 days ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago