Recent Posts
Androidfags zara idhar aana
XHDATA D-808 DX-ing setup, analogue modulation
i don't understand
RCE on Pocketbase possible?
Shifting to linux mint
AI Impact Summit 2026
/emacs/ general
Simple Linux General /slg/ - Useful Commands editi...
/wpg/ - Windows & Powershell General
Sarvam Apology Thread
Some cool tech in my college
the hmd touch 4g
Holy Shit
Saar american companies have best privacy saaar
/desktop thread/
Forking jschan to submit a PR for captcha logic
JEEFICATION OF GSOC
4Chan bypass?
/g/ related blogpost - backup thread
Android Hygiene
My favorite game rn
COOKED
Are we getting real 5g?
I want to create my own forum but I don't know how...
Is my psu not compatible with my mobo?
/i2pg/ - I2P general
ISP Throttling
zoomies jara idhar ana
Zerodha just donated 100,000 usd to FFMPEG
Jio Fiber
/compiler_develoment/ thread
what is computer science?
just installed Arch Linux bros
Sketch - A simple 2D graphics library in C
Gemini+Figma for UI
LEARNING SPREADSHEETS
/GDG/
RCE on Pocketbase possible?
2JeWbY
No.3172
Yaaron I am doing vulnerability testing for a product and I got one endpoint on which I manage to get read/write access by grepping access token via curl. I tried .py and .php code for admin level execution but I failed.
Pocketbase runs on go and I am a retard who can't write go for RCE (remote code execution). I don't know if go will work in RCE. So what should I do to get admin = "true" so that I can use pb CLI with admin token as payload , once there I can try to execute shell commands and possibly create ssh keys
or maybe I should give up :(
sqrvwV
No.3190
Maybe it is
wAKyen
No.3192
>>3172(OP)
You got read write perms ? Report it,
Wtf do you mean by .py and php code there's no interpreted runtime in go where you can inject and execute arbitrary code.
Cot8bx
No.3365
>>3172(OP)
what even are you talking about? R/W by "grep"ing access token? what?





















































