Kali Linux

Upload_Bypass_Carnage : File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques!

Upload_bypass,File upload restrictions bypass, by using different bug bounty techniques!

POC video:

Installation:

pip3 install -r requirements.txt

Usage: upload_bypass.py [options]

Options: -h, –help

  show this help message and exit

-u URL, –url=URL

  Supply the login page, for example: -u http://192.168.98.200/login.php'

-s , –success

 Success message when upload an image, example: -s 'Image uploaded successfully.'

-e , –extension

 Provide server backend extension, for example: --extension php (Supported extensions: php,asp,jsp,perl,coldfusion)

-a , –allowed

 Provide allowed extensions to be uploaded, for example: jpeg,png

-H , –header

 (Optional) - for example: '"X-Forwarded-For":"10.10.10.10"' - Use double quotes around the data and wrapp it all with single quotes. Use comma to separate multi headers.

-l , –location

 (Optional) - Supply a remote path where the webshell suppose to be. For exmaple: /uploads/

-S, –ssl

 (Optional) - No checks for TLS or SSL

-p, –proxy

 (Optional) - Channel the requests through proxy

-c, –continue

 (Optional) - If set, the brute force will continue even if one or more methods found!

-v, –verbose

 (Optional) - Printing the http response in terminal

-U , –username

 (Optional) - Username for authentication. For exmaple: --username admin

-P , –password

 (Optional) - - Password for authentication. For exmaple: --password 12345

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

20 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

20 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

4 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago