Skip to content

Instantly share code, notes, and snippets.

Created September 26, 2020 01:03
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
Star You must be signed in to star a gist
What would you like to do?
POST /vulnerabilities/exec/ HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:81.0) Gecko/20100101 Firefox/81.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 21
Origin: http://localhost
Connection: keep-alive
Referer: http://localhost/vulnerabilities/exec/
Cookie: PHPSESSID=ivl087l8v59hreahq449ekg3o5; security=low
Upgrade-Insecure-Requests: 1
Pragma: no-cache
Cache-Control: no-cache
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment