Command Injection

Find vulnerabilities where commands can be injected through user input.

Add Prompt

Command Injection Scan

Identify user input fields allowing shell command execution.

nucleiprompts.com