Update README.md

This commit is contained in:
İsmail Taşdelen
2019-11-04 07:05:46 +03:00
committed by GitHub
parent 377387c23e
commit 7a614ae1a1

View File

@@ -1,5 +1,8 @@
### RFI/LFI Payload List
<img src="https://github.com/payloadbox/rfi-lfi-payload-list/blob/master/img/rfi-lfi.jpeg">
</center>
As with many exploits, remote and local file inclusions are only a problem at the end of the encoding. Of course it takes a second person to have it. Now this article will hopefully give you an idea of protecting your website and most importantly your code from a file iclusion exploit. Ill give code examples in PHP format.
Lets look at some of the code that makes RFI / LFI exploits possible.