OS Command Injection Vulnerability Payload List
Overview:
Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. Command injection attacks are possible when an application passes unsafe user supplied data (forms, cookies, HTTP headers etc.) to a system shell. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application. Command injection attacks are possible largely due to insufficient input validation.
This attack differs from Code Injection, in that code injection allows the attacker to add his own code that is then executed by the application. In Command Injection, the attacker extends the default functionality of the application, which execute system commands, without the necessity of injecting code.
References
• OS Command Injection point_right https://www.owasp.org/index.php/Command_Injection
Download
Cloning an Existing Repository ( Clone with HTTPS )
root@slife:~# git clone https://github.com/omurugur/OS_Command_Payload_List.git
Cloning an Existing Repository ( Clone with SSH )
root@slife:~# git clone git@github.com:omurugur/OS_Command_Payload_List.git

Formed in 2009, the Archive Team (not to be confused with the archive.org Archive-It Team) is a rogue archivist collective dedicated to saving copies of rapidly dying or deleted websites for the sake of history and digital heritage. The group is 100% composed of volunteers and interested parties, and has expanded into a large amount of related projects for saving online and digital history.
