GIF89a; ;; BypassServ By HaxorSec
[ Command Bypas Status Wajib ON MAIL PUTENV @ HaxorSec]
[ mail() : [ ON ] ] [ mb_send_mail() : [ ON ] ] [ error_log() : [ ON ] ] [ imap_mail() : [ ON ] ][ Function putenv() ] : [ ON ]

DIR: //home/phir/nuclei-templates/http/vulnerabilities/generic / [ GO Home ]



Command BYPASS
Command BIASA
Create Folder
Create File

Item Name
Size
Date
Permissions
View
Delete
Rename
. 4096 2025-12-19 08:38:32 0700
.. 4096 2025-12-19 08:38:32 0700
cache-poisoning-xss.yaml 1317 2025-12-19 08:38:32 0664
cache-poisoning.yaml 1180 2025-12-19 08:38:32 0664
cors-misconfig.yaml 3637 2025-12-19 08:38:32 0664
crlf-injection-generic.yaml 4641 2025-12-19 08:38:32 0664
error-based-sql-injection.yaml 16297 2025-12-19 08:38:32 0664
generic-blind-xxe.yaml 804 2025-12-19 08:38:32 0664
generic-env.yaml 1551 2025-12-19 08:38:32 0664
generic-j2ee-lfi.yaml 1599 2025-12-19 08:38:32 0664
generic-linux-lfi.yaml 2854 2025-12-19 08:38:32 0664
generic-windows-lfi.yaml 2539 2025-12-19 08:38:32 0664
host-header-injection.yaml 1094 2025-12-19 08:38:32 0664
oob-header-based-interaction.yaml 1911 2025-12-19 08:38:32 0664
oob-param-based-interaction.yaml 1184 2025-12-19 08:38:32 0664
open-redirect-generic.yaml 4005 2025-12-19 08:38:32 0664
request-based-interaction.yaml 1559 2025-12-19 08:38:32 0664
top-xss-params.yaml 5608 2025-12-19 08:38:32 0664
xmlrpc-pingback-ssrf.yaml 992 2025-12-19 08:38:32 0664
xss-fuzz.yaml 28070 2025-12-19 08:38:32 0664
xss-uri-reflected.yaml 1169 2025-12-19 08:38:32 0664