- Check if the metadata is stripped after upload
- Change the file extension
- use pht, phpt, phtml, php3,php4,php5,php6 as file extension (might as well bruteforce it)
- Change the extension but not the content type
- whitelist bypass : Shell.jpg.php or shell.php%00.jpg
- Check for svg file upload
- Lfi (../../../../shell.php)
- Upload large file size for ddos
- Change the magic bytes
- sql (‘sleep(10).jpg)
- If image upload is posible, change content type to image/svg+xml then test for xss, xxe, ssrf