Halaman

    Social Items

GA TAU MAU NGAPAIN.

    Ga tau mau ngapain jadi bikin aja post ini wekwkeowokekwoew
pertama anda itu kontol
    list tamper sqlmap.
        * 0eunion.py - Replaces instances of <int> UNION with <int>e0UNION
        * apostrophemask.py - Replaces apostrophe character (') with its UTF-8 full width counterpart (e.g. ' -> %EF%BC%87)
        * appendnullbyte.py - Appends (Access) NULL byte character (%00) at the end of payload
        * base64encode.py - Base64-encodes all characters in a given payload
        * between.py - Replaces greater than operator ('&gt;') with 'NOT BETWEEN 0 AND #' and equals operator ('=') with 'BETWEEN # AND #'
        * binary.py - Injects keyword binary where possible
        * bluecoat.py - Replaces space character after SQL statement with a valid random blank character. Afterwards replace character '=' with operator LIKE
        * chardoubleencode.py - Double URL-encodes all characters in a given payload (not processing already encoded) (e.g. SELECT -&gt; %2553%2545%254C%2545%2543%2554)
        * charencode.py - URL-encodes all characters in a given payload (not processing already encoded) (e.g. SELECT -&gt; %53%45%4C%45%43%54)
        * charunicodeencode.py - Unicode-URL-encodes all characters in a given payload (not processing already encoded) (e.g. SELECT -&gt; %u0053%u0045%u004C%u0045%u0043%u0054)
        * charunicodeescape.py - Unicode-escapes non-encoded characters in a given payload (not processing already encoded) (e.g. SELECT -&gt; \u0053\u0045\u004C\u0045\u0043\u0054)
        * commalesslimit.py - Replaces (MySQL) instances like 'LIMIT M, N' with 'LIMIT N OFFSET M' counterpart
        * commalessmid.py - Replaces (MySQL) instances like 'MID(A, B, C)' with 'MID(A FROM B FOR C)' counterpart
        * commentbeforeparentheses.py - Prepends (inline) comment before parentheses (e.g. ( -&gt; /**/()
        * concat2concatws.py - Replaces (MySQL) instances like 'CONCAT(A, B)' with 'CONCAT_WS(MID(CHAR(0), 0, 0), A, B)' counterpart
        * dunion.py - Replaces instances of <int> UNION with <int>DUNION
        * equaltolike.py - Replaces all occurrences of operator equal ('=') with 'LIKE' counterpart
        * equaltorlike.py - Replaces all occurrences of operator equal ('=') with 'RLIKE' counterpart
        * escapequotes.py - Slash escape single and double quotes (e.g. ' -&gt; \')
        * greatest.py - Replaces greater than operator ('&gt;') with 'GREATEST' counterpart
        * halfversionedmorekeywords.py - Adds (MySQL) versioned comment before each keyword
        * hex2char.py - Replaces each (MySQL) 0x<hex> encoded string with equivalent CONCAT(CHAR(),...) counterpart
        * htmlencode.py - HTML encode (using code points) all non-alphanumeric characters (e.g. ' -&gt; ')
        * ifnull2casewhenisnull.py - Replaces instances like 'IFNULL(A, B)' with 'CASE WHEN ISNULL(A) THEN (B) ELSE (A) END' counterpart
        * ifnull2ifisnull.py - Replaces instances like 'IFNULL(A, B)' with 'IF(ISNULL(A), B, A)' counterpart
        * informationschemacomment.py - Add an inline comment (/**/) to the end of all occurrences of (MySQL) "information_schema" identifier
        * least.py - Replaces greater than operator ('&gt;') with 'LEAST' counterpart
        * lowercase.py - Replaces each keyword character with lower case value (e.g. SELECT -&gt; select)
        * luanginx.py - LUA-Nginx WAFs Bypass (e.g. Cloudflare)
        * misunion.py - Replaces instances of UNION with -.1UNION
        * modsecurityversioned.py - Embraces complete query with (MySQL) versioned comment
        * modsecurityzeroversioned.py - Embraces complete query with (MySQL) zero-versioned comment
        * multiplespaces.py - Adds multiple spaces (' ') around SQL keywords
        * overlongutf8.py - Converts all (non-alphanum) characters in a given payload to overlong UTF8 (not processing already encoded) (e.g. ' -&gt; %C0%A7)
        * overlongutf8more.py - Converts all characters in a given payload to overlong UTF8 (not processing already encoded) (e.g. SELECT -&gt; %C1%93%C1%85%C1%8C%C1%85%C1%83%C1%94)
        * percentage.py - Adds a percentage sign ('%') infront of each character (e.g. SELECT -&gt; %S%E%L%E%C%T)
        * plus2concat.py - Replaces plus operator ('+') with (MsSQL) function CONCAT() counterpart
        * plus2fnconcat.py - Replaces plus operator ('+') with (MsSQL) ODBC function {fn CONCAT()} counterpart
        * randomcase.py - Replaces each keyword character with random case value (e.g. SELECT -&gt; SEleCt)
        * randomcomments.py - Add random inline comments inside SQL keywords (e.g. SELECT -&gt; S/**/E/**/LECT)
        * schemasplit.py - Replaces instances of <int> UNION with <int>e0UNION
        * sp_password.py - Appends (MsSQL) function 'sp_password' to the end of the payload for automatic obfuscation from DBMS logs
        * space2comment.py - Replaces space character (' ') with comments '/**/'
        * space2dash.py - Replaces space character (' ') with a dash comment ('--') followed by a random string and a new line ('\n')
        * space2hash.py - Replaces (MySQL) instances of space character (' ') with a pound character ('#') followed by a random string and a new line ('\n')
        * space2morecomment.py - Replaces (MySQL) instances of space character (' ') with comments '/**_**/'
        * space2morehash.py - Replaces (MySQL) instances of space character (' ') with a pound character ('#') followed by a random string and a new line ('\n')
        * space2mssqlblank.py - Replaces (MsSQL) instances of space character (' ') with a random blank character from a valid set of alternate characters
        * space2mssqlhash.py - Replaces space character (' ') with a pound character ('#') followed by a new line ('\n')
        * space2mysqlblank.py - Replaces (MySQL) instances of space character (' ') with a random blank character from a valid set of alternate characters
        * space2mysqldash.py - Replaces space character (' ') with a dash comment ('--') followed by a new line ('\n')
        * space2plus.py - Replaces space character (' ') with plus ('+')
        * space2randomblank.py - Replaces space character (' ') with a random blank character from a valid set of alternate characters
        * substring2leftright.py - Replaces PostgreSQL SUBSTRING with LEFT and RIGHT
        * symboliclogical.py - Replaces AND and OR logical operators with their symbolic counterparts (&amp;&amp; and ||)
        * unionalltounion.py - Replaces instances of UNION ALL SELECT with UNION SELECT counterpart
        * unmagicquotes.py - Replaces quote character (') with a multi-byte combo %BF%27 together with generic comment at the end (to make it work)
        * uppercase.py - Replaces each keyword character with upper case value (e.g. select -&gt; SELECT)
        * varnish.py - Appends a HTTP header 'X-originating-IP' to bypass Varnish Firewall
        * versionedkeywords.py - Encloses each non-function keyword with (MySQL) versioned comment
        * versionedmorekeywords.py - Encloses each keyword with (MySQL) versioned comment
        * xforwardedfor.py - Append a fake HTTP header 'X-Forwarded-For' (and alike)

          
Kedua ya anda itu memang kontol.
          function php yang bisa di exploit.
          system()
          exec()
          shell_exec()
          passthru()
          popen()
          call_user_func() -> ini lu pikir sendiri aja dah males gw
          serialize -> ini biasanya kalo di gabungin sama eval wokwokwokwokwok
          btw buat local file inclusion kalo si allow_url_include on kita bisa get rce lewat php://input, caranya ? ya lu pikir sendiri lah goblok.
          
          
dah lah segitu aja anjing, males gw.

Tidak ada komentar