Remote Code Execution (RCE)
Identify remote command execution weaknesses.
RCE Detection via File Upload Exploitation
Scan for insecure file upload mechanisms that allow RCE.
Detect RCE via Unsafe Function Calls
Identify unsafe function calls that may lead to remote command execution.
RCE via File Upload
Detect RCE vulnerabilities through insecure file upload mechanisms.
Command Injection Detection
Identify potential command injection vulnerabilities in input fields.
Basic RCE Detection
Find potential remote command execution in input fields.