expload/README.md

30 lines
1.2 KiB
Markdown

# Expload
![image](https://github.com/user-attachments/assets/fbae4274-21d0-4233-9c96-5e19bab88488)
## what is expload
A tool for injecting magic bytes of allowed files, and spoofing the mime type. In order to exploit vulnerable file upload forms that use these as the sole validation mechanism
## useage
```
expload.py [-h] -u URL -p PAYLOAD -e EXT -n NAME -f FILENAME [-d] [-h2] [-he HEADERS [HEADERS ...]] [-c COOKIES] [-r]
expload args
options:
-h, --help show this help message and exit
-u URL, --url URL url to upload to
-p PAYLOAD, --payload PAYLOAD
path to file to upload
-e EXT, --ext EXT extension to spoof
-n NAME, --name NAME field name for file upload
-f FILENAME, --filename FILENAME
file name to upload with
-d, --doubleextend spoofed extension inserted into filename
-h2, --http2 use http2 if supported
-he HEADERS [HEADERS ...], --headers HEADERS [HEADERS ...]
headers and keys colon seperated
-c COOKIES, --cookies COOKIES
cookies seperated by ; and wrapped in quotes
-r, --response display the response from the target webapp
```