<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>File Upload on 0xMesbaha</title>
    <link>https://hussienmisbah.github.io/tags/file-upload/</link>
    <description>Recent content in File Upload on 0xMesbaha</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Thu, 30 Apr 2026 12:49:18 +0200</lastBuildDate>
    <atom:link href="https://hussienmisbah.github.io/tags/file-upload/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>No .php, No Problem: Executing PHP Through Unexpected Paths</title>
      <link>https://hussienmisbah.github.io/posts/web-exploitation/2026-04-30-executing-php-through-unexpected-paths/</link>
      <pubDate>Thu, 30 Apr 2026 12:49:18 +0200</pubDate>
      <guid>https://hussienmisbah.github.io/posts/web-exploitation/2026-04-30-executing-php-through-unexpected-paths/</guid>
      <description>&lt;p&gt;In a recent project i came across a file upload function which i really love to spend time understanding how it exactly works to ensure either it can be exploited or not. the interesting thing which makes me write this blog is the bypass idea which is not really common and btw i spent much time chatting with ai platforms to get suggestions and none of them directed me through this path to be honest it was 6 months ago so maybe it can now :&amp;ldquo;D&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
