Skip to content

Latest commit

 

History

History
59 lines (35 loc) · 5.23 KB

README.md

File metadata and controls

59 lines (35 loc) · 5.23 KB

SQL Injection Vulnerability Payload List

Donate using Liberapay

Overview:

A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. SQL injection attacks are a type of injection attack, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands.

References

• SQL Injection point_right https://www.owasp.org/index.php/SQL_Injection

Download

Cloning an Existing Repository ( Clone with HTTPS )

root@slife:~# git clone https://github.com/omurugur/SQL_Injection_Payload.git
Cloning an Existing Repository ( Clone with SSH )

root@slife:~# git clone [email protected]:omurugur/SQL_Injection_Payload.git

Contact

Donate!

Support the authors: