Identifying the SSTI vulnerability. Create a custom exploit to delete the file /.ssh/id_rsa
No download links available.