We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Directory traversal.
Hackers can gain access to a wealth of sensitive information including configuration files.
For example, here I can read my .bashrc and zaver.conf
.bashrc
zaver.conf