From 7a614ae1a1801b4f505a1966fb32d4e0b40a5aeb Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C4=B0smail=20Ta=C5=9Fdelen?= Date: Mon, 4 Nov 2019 07:05:46 +0300 Subject: [PATCH] Update README.md --- README.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/README.md b/README.md index 84d7ed3..0c32576 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,8 @@ ### RFI/LFI Payload List + + + As with many exploits, remote and local file inclusions are only a problem at the end of the encoding. Of course it takes a second person to have it. Now this article will hopefully give you an idea of protecting your website and most importantly your code from a file iclusion exploit. I’ll give code examples in PHP format. Let’s look at some of the code that makes RFI / LFI exploits possible.