Upload_bypass,File upload restrictions bypass, by using different bug bounty techniques!
POC video:
pip3 install -r requirements.txt
Usage: upload_bypass.py [options]
Options: -h, –help
show this help message and exit
-u URL, –url=URL
Supply the login page, for example: -u http://192.168.98.200/login.php'
-s , –success
Success message when upload an image, example: -s 'Image uploaded successfully.'
-e , –extension
Provide server backend extension, for example: --extension php (Supported extensions: php,asp,jsp,perl,coldfusion)
-a , –allowed
Provide allowed extensions to be uploaded, for example: jpeg,png
-H , –header
(Optional) - for example: '"X-Forwarded-For":"10.10.10.10"' - Use double quotes around the data and wrapp it all with single quotes. Use comma to separate multi headers.
-l , –location
(Optional) - Supply a remote path where the webshell suppose to be. For exmaple: /uploads/
-S, –ssl
(Optional) - No checks for TLS or SSL
-p, –proxy
(Optional) - Channel the requests through proxy
-c, –continue
(Optional) - If set, the brute force will continue even if one or more methods found!
-v, –verbose
(Optional) - Printing the http response in terminal
-U , –username
(Optional) - Username for authentication. For exmaple: --username admin
-P , –password
(Optional) - - Password for authentication. For exmaple: --password 12345
This repository contains tools created by yogSahare0 while learning Python 3 for ethical hacking and penetration testing.…
"NetSecChallenger" provides a suite of automated tools designed for security professionals and network administrators to…
The essential tool for cybersecurity enthusiasts! This guide provides a detailed walkthrough on how to…
Meet "Poodone," the ultimate Python script designed for cybersecurity enthusiasts and professionals alike. Packed with…
The Linux version is no longer supported! The last Linux version is 6.0 that you…
Jin is a hacking command-line tools designed to make your scan port, gathering urls, check…