Skip to content
View Xib3rR4dAr's full-sized avatar
Block or Report

Block or report Xib3rR4dAr

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned

  1. filter-var-sqli filter-var-sqli Public

    Bypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )

    30 1

  2. WannaRace WannaRace Public

    WebApp intentionally made vulnerable to Race Condition for practicing Race Condition

    PHP 23 8

  3. CloudFlareXSS CloudFlareXSS Public

    Cloudflare Bypass in HTML, attribute and JS context

    1

  4. shortest-php-webshell shortest-php-webshell Public

    Shortest PHP Webshell

    PHP 3

  5. SQL Injection Detection by fuzzing a... SQL Injection Detection by fuzzing and observing responses
    1
    # SQL Injection litmus tests.
    2
    
                  
    3
    ### String based: (single quote)
    4
    Below, by error it means some error appears or shows some different behaviour  
    5
    `\`     // some error or a different behaviour  
  6. WordPress Plugin WP Statistics <= 13... WordPress Plugin WP Statistics <= 13.1.5 - Multiple Unauthenticated SQL Injection vulnerabilities
    1
    # WordPress Plugin WP Statistics <= 13.1.5 - Multiple Unauthenticated SQL Injection vulnerabilities
    2
    
                  
    3
    <table>
    4
    <tr><td>Exploit Title</td><td>WordPress Plugin WP Statistics <= 13.1.5 - Multiple Unauthenticated SQL Injection vulnerabilities</td></tr>
    5
    <tr><td>Exploit Author</td><td>Muhammad Zeeshan (Xib3rR4dAr)</td></tr>