[BEW 2.3: Web Security] Clone this repo to begin the SSTI exploit activity.
-
Updated
Apr 7, 2021 - HTML
[BEW 2.3: Web Security] Clone this repo to begin the SSTI exploit activity.
CS5331 Server-Side Template Injection Project
Serverside Template Injection (SSTI) RCE - THM challenge "whiterose"
Exploit against Grav CMS (versions below 1.7.45) that allows Remote Code Execution for an authenticated user - CVE-2024-28116
This script will prepare some tmux session precompiled to test command injection on some web page parameter (on a GET or POST request).
Server-side template injections (SSTI) are vulnerabilities that let the attacker inject code into such server-side templates. In simple terms, the attacker can introduce code that is actually processed by the server-side template. A sample cyber security project.
Express app with Pug templates demonstrating SSTI vulnerability and secure implementation for educational purposes.
An Intentionally Vulnerable SSTI application for a beginner to an experienced.
A simple automation tool to detect LFI, RCE and SSTI vulnerability. Forked for PR and customization
Simple ssti payload generator for java using concat technique
Add a description, image, and links to the ssti topic page so that developers can more easily learn about it.
To associate your repository with the ssti topic, visit your repo's landing page and select "manage topics."