Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

Aizawa is a command-line webshell designed to execute commands through HTTP header

License

NotificationsYou must be signed in to change notification settings

elliottophellia/aizawa

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

47 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

    ___   ________  ___ _      _____   / _| /  _/_  / / _|| /| / / _|  / __|_/ /  / /_/ __||/|/ / __| /_/|_/___/ /___/_/|_|__/|__/_/|_|

Aizawa is a command-line webshell designed to execute commands through HTTP header, enabling it to circumvent Web Application Firewalls (WAF) and Intrusion Detection Systems (IDS). Additionally, it is capable of bypassingdisable_function restrictions, making it a tool of interest for security researchers and penetration testers. The name "Aizawa" is derived from Aizawa Ema, a virtual YouTuber associated with the Virtual Esport Project (VSPO), a group known for its focus on esports and virtual content creation.

PythonLicenseVersion

Buy Me a CoffeeTraktir Saya Kopi

ChangelogsPrerequisitesInstallationFeaturesLicenseDisclaimer

Warning

The webshell is optimally compatible with PHP versions below 8.2. Users may experience connectivity issues when attempting to use this tool with PHP environments running version 8.2 or higher. This is a known issue that is currently being addressed in future updates.

Important

The webshell itself is moved toaizawa-webshell repository. This repository is now dedicated to the webshell client.

Changelogs

Major Changes

  • Complete codebase rewrite using modern Python practices
  • Added Poetry for dependency management
  • Implemented XOR encryption for secure command transmission#12
  • Removed HTTP_USER_AGENT and HTTP_ACCEPT_LANGUAGE methods
  • Enhanced error handling and input validation
  • Improved code organization with proper modularization
  • Added proxy support for requests
  • Implemented async/await pattern throughout
  • Added webshell key validation#12

Removed Features

  • Removed legacy HTTP methods (USER_AGENT, ACCEPT_LANGUAGE)
  • Removed direct system command execution methods
  • Removed unused HTTP request methods

Prerequisites

  • python 3.13+
  • poetry
  • httpx 0.25.0+
  • validators 0.22.0+

Installation

Release

# Install using pipxpipx install aizawa

Development

# Clone the repositorygit clone https://github.com/elliottophellia/aizawa# Change directorycd aizawa# Install dependencies using Poetrypoetry install# Build the packagepoetry build# Install the packagepipx install dist/aizawa-2.0.0.tar.gz

Usage

# Basic usageaizawa --help# With argumentsaizawa -u<URL> -k<KEY># With proxyaizawa -u<URL> -k<KEY> -p<PROXY_URL>

Command Line Arguments

  • -u, --url: Webshell URL
  • -k, --key: Webshell encryption key
  • -p, --proxy: Proxy URL (e.g.,http://127.0.0.1:8080)
  • -v, --version: Show version information

Features

  • XOR encrypted command transmission
  • Proxy support
  • Async HTTP requests
  • Multiple execution methods
  • Enhanced error handling
  • WAF/IDS evasion
  • disable_function bypass
  • Secure communication protocol

License

This project is licensed under the Creative Commons Attribution Share Alike 4.0 International (CC-BY-SA-4.0). For more information, please refer to theLICENSE file included in this repository.

Disclaimer

This project is intended solely for educational and research purposes. The author does not endorse, condone, or encourage any unauthorized or illegal use of this tool. Users are solely responsible for ensuring that their actions comply with all applicable laws and regulations. The author shall not be held liable for any misuse, damage, or consequences arising from the use of this software.


[8]ページ先頭

©2009-2025 Movatter.jp