CTF-s/DogCat.md at main · S12cybersecurity/CTF-s · GitHub
Exploiting Local File Inclusion (LFI) Using PHP Wrapper | by Gupta Bless | Medium
Adrian on X: "Making use of an LFI vulnerability you can read the contents of any PHP file with this filter: http://example[.]com/index.php?page=php:// filter/read=convert.base64-encode/resource=config.php #LFI #LocalFileInclusion #Tip #Disclosure #PHP ...
Day 6] Patch Management Is Hard - 4PFSEC
PwnLab: init walk through – Duncan Winfrey
PHP filters – root me challenge | Arab's Cyber Security
Exploiting Local File Inclusion (LFI) Using PHP Wrapper | by Gupta Bless | Medium
How to Beat LFI Restrictions with Advanced Techniques « Null Byte :: WonderHowTo
VulnHub —PWNLAB: INIT (OSCP-Prep)Writeup — by dollarboysushil | by dollarboysushil | Dec, 2023 | InfoSec Write-ups
PHP filter chains: file read from error-based oracle
CTF — PHP - Filters | Лаборатория сисадмина | Дзен
How to Beat LFI Restrictions with Advanced Techniques « Null Byte :: WonderHowTo
PeeHagePee
December 2021 – PuckieStyle
Secure D Global - RT @wugeej: Exploiting Out Of Band XXE using internal network and php wrappers <!ENTITY % data SYSTEM "php://filter/convert.base64 -encode/resource=file:///D:/path/index.php"> ... exfil SYSTEM "http://target/endp.php?sid=[session_id ...
Using PHP Wrappers within LFI to Obtain PHP Script Source Code | Infinite Logins
pwnlab_init | Bob1Bob2
Php wrapper and Local File Inclusion | by Robins George | Medium
One LFI bypass to rule them all (using base64) - Matan-h
Exploiting LFI Vulnerabilities | Black Hat Ethical Hacking
Adrian on X: "Making use of an LFI vulnerability you can read the contents of any PHP file with this filter: http://example[.]com/index.php?page=php:// filter/read=convert.base64-encode/resource=config.php #LFI #LocalFileInclusion #Tip #Disclosure #PHP ...
Local file inclusion using PHP filter (Base64 encoding) – January 31, 2024