规则名称 运行时 规则描述
JSP Command Execution JVM Discover the behavior of command execution from java server pages
Log4j Exploit JVM Detected exploit process for log4j
WebShell Behavior Detect JVM Suspected WebShell-like behavior found in JVM runtime
Command Execution Caused By FastJson Deserialization JVM FastJson deserializes attacker-constructed data, resulting in command execution
Command Execution In preg_replace Function PHP Unusual behavior of php preg_replace function for command execution
BeHinder WebShell Detect PHP BeHinder WebShell detect by PHP runtime stack trace