Skip to content
#

file-upload-vulnerability

Here are 15 public repositories matching this topic...

Discover backup files on web servers with BackupFinder. Generate intelligent patterns for effective penetration testing and security audits. 🛠️💻

  • Updated Jul 29, 2025
  • Go

This case demonstrates a classic but still deeply effective tactic: the use of an improperly validated file upload to implant a web shell. It wasn’t an exploit. It wasn’t a brute force attack. It was a misused feature — a vulnerable application logic path that let an attacker turn a web server into a foothold.

  • Updated May 23, 2025
  • Jupyter Notebook

Improve this page

Add a description, image, and links to the file-upload-vulnerability topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the file-upload-vulnerability topic, visit your repo's landing page and select "manage topics."

Learn more