Enable build support by adding .buildspec.yml
README.md Loading last commit info...

Exploring Command Injection Vulnerabilities in Windows with Nim

Here's a summarized table based on the testing results from the Nim code experiments with different payloads:

nim &calcNot PassedNot PassedPassed
nim" &calcPassedNot PassedNot Passed

"Passed" indicates the payload executed in a way that could potentially exploit the BatBadBut vulnerability, demonstrating the nuanced behavior of command execution methods in Nim in response to different types of inputs.

Please wait...
Page is in error, reload to recover