sql-injection-attacks
There are 77 repositories under sql-injection-attacks topic.
payloadbox/sql-injection-payload-list
🎯 SQL Injection Payload List
americo/sqlifinder
SQL Injection Vulnerability Scanner made with Python
harismuneer/Flight-Booking-System-JavaServlets_App
✈️ An MVP level Flight Booking System (web-application) based on the Model View Controller (MVC) Architecture made using Java Servlets, Java Server Pages (JSPs). Moreover authentication and authorization for users is implemented. The web-application is also secured against SQL Injection and Cross-Site Scripting attacks.
omurugur/SQL_Injection_Payload
SQL Injection Payload List
arpeetrathii/50-Days-Of-SQLi
Learning and hunting SQL injection bugs for 50 continuous days
txn2/n2proxy
Contraband filtering reverse proxy for plain http and SSL.
inforkgodara/sql-injection
It is a SQL injection vulnerable project with demonstration. It is developed using PHP and MySQL technologies. It also contains a youtube link where fully demonstrated SQL Injection.
fagun18/web-vulnerability
Web Vulnerability Scanning and Exploitation Script
R3DHULK/sqli-detector-in-python
python based sqli detector tool
Aryia-Behroziuan/SQL-Injection-attacks
SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with databases. SQL allows the website to create, retrieve, update, and delete database records. It used for everything from logging a user into the website to storing details of an eCommerce transaction. An SQL injection attack places SQL into a web form in an attempt to get the application to run it. For example, instead of typing plain text into a username or password field, a hacker may type in ‘ OR 1=1. If the application appends this string directly to an SQL command that is designed to check if a user exists in the database, it will always return true. This can allow a hacker to gain access to a restricted section of a website. Other SQL injection attacks can be used to delete data from the database or insert new data. Hackers sometimes use automated tools to perform SQL injections on remote websites. They will scan thousands of websites, testing many types of injection attacks until they are successful. SQL injection attacks can be prevented by correctly filtering user input. Most programming languages have special functions to safely handle user input that is going to be used in an SQL query.
jayantrane/Secure-Systems-of-SQL-Injection-Attack
Secure Systems possessing SQL Injection Vulnerability
Err0r-ICA/DIOS_WAF_bypass
Custom DIOS for SQL injection
saptajitbanerjee/SQL-Injection-Detection
My team built a Machine Learning model to detect SQL Injections. The dataset was prepared by capturing normal and malicious HTTP requests, extracting essential features for training the model effectively. It enhances web application security by accurately identifying and flagging SQL Injection attacks.
galihap76/web-app-sql-injection
This is my repo to hack my web app about vulnerability sql injection with python.
sadiqsonalkar/PortSwigger-Lab-and-Burpsuite-Tutorial
It is a burpsuite introduction and these are 5 lab I performed in Burpsuite.
Alfredredbird/Bibi-Bird
Bibi-Bird is a SQL Injection Automation tool.
NeuronAddict/vulnerable-apps
Some vulnerables docker webapps
soufianetahiri/sqlmap-cheat-sheet
sqlmap cheat sheet
adamalston/SQL-Injection
SQL Injection exploit 💉
danbettles/defence
A simple intrusion detection/prevention system framework written in PHP.
philip-hub/sql-injection-hack-workshop
This is a workshop to teach the basics of SQL injection
samedog/PHPmvs
PHPmvs is an old tool i wrote to test common web apps and server vulnerabilities
mannasoumya/sqltrip
SQL Map in CORE JAVA
milesrack/sqli-lab
SQL injection lab built to demonstrate and teach the basics of SQL injection attacks
gevendra115/sqlfinder
SQL Injection Vulnerability Scanner made with Python
ImKKingshuk/StealthSQL
StealthSQL: The Ultimate SQL Injection Tool - Dive into the shadows of web security with StealthSQL. Harness the power of StealthSQL to silently unveil vulnerabilities in SQL databases. Conduct stealthy SQL injections, expose misconfigurations, and empower your security journey. 🕵️♂️🔐
scurite/Websites-Security
We are going to go through some techniques and common PHP use cases for Website Security. Website security is often overlooked- and that’s understandable, but basic security can be put down to lots of techniques.
secdec/esm-7
Convenience wrapper around the sqlmap SQL injection tool to help with automation
toggio/SecureTokenizer
A PHP Library for Cryptographically Secure Token Generation and Management
gui1535/sql-injection-list
Lista de SQL Injection
idrisawad/Vulnerability_Scanner
This script is a powerful and efficient tool for identifying vulnerabilities in web applications. Its multi-threading, fingerprinting, exploit verification, WAF bypass and logging features make it a valuable addition to any security tester's toolkit.
kaanaktas/go-slm
policy-based service level management library that enforces policy requirements
MD571/Demonstration-of-Android-Vulnerabilities
Demonstration of an Android attack through a vulnerability in Android
shivamkumar06/Vulnerable-Web-Application
This Project is a demo of XSS attacks and SQL Injection by The OWASP Foundation. Payloads are in the respective folders in Attack.md
TearsAchly/DVWA
DVWA (Damn Vulnerable Web Application) DVWA is a web application that is intentionally made vulnerable for educational and security testing purposes. It lets users practice and understand different types of web security attacks.