close
The Wayback Machine - https://web.archive.org/web/20201126005555/https://github.com/omurugur/OS_Command_Payload_List
Skip to content
master
Go to file
Code

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
May 29, 2019

README.md

OS Command Injection Vulnerability Payload List

Image Image Donate using Liberapay

Overview:

Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application. Command injection attacks are possible largely due to insufficient input validation.

This attack differs from Code Injection, in that code injection allows the attacker to add his own code that is then executed by the application. In Command Injection, the attacker extends the default functionality of the application, which execute system commands, without the necessity of injecting code.

References

• OS Command Injection point_right https://www.owasp.org/index.php/Command_Injection

Download

Cloning an Existing Repository ( Clone with HTTPS )

root@slife:~# git clone https://github.com/omurugur/OS_Command_Payload_List.git
Cloning an Existing Repository ( Clone with SSH )

root@slife:~# git clone git@github.com:omurugur/OS_Command_Payload_List.git

Contact

Mail : omurugur12@gmail.com
Linkedin : https://www.linkedin.com/in/omurugur-sibergüvenlik/
GitHub : https://github.com/omurugur
Twitter : https://twitter.com/omurugurrr
Medium : https://medium.com/@mruur
Donate!

Support the authors:

Releases

No releases published

Packages

No packages published
You can’t perform that action at this time.