🤬
Enable build support by adding .buildspec.yml
README.md Loading last commit info...
main.nim
test.bat
README.md

Exploring Command Injection Vulnerabilities in Windows with Nim

Here's a summarized table based on the testing results from the Nim code experiments with different payloads:

PayloadexecProcess_NoQuoteShellexecProcess_QuoteShellexecShellCmd
nim &calcNot PassedNot PassedPassed
nim" &calcPassedNot PassedNot Passed
%CMDCMDLINE:~-1%&calcPassedPassedPassed

"Passed" indicates the payload executed in a way that could potentially exploit the BatBadBut vulnerability, demonstrating the nuanced behavior of command execution methods in Nim in response to different types of inputs.


Please wait...
Page is in error, reload to recover