You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+29-7
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
# SQL Injection Payload List
1
+
###SQL Injection Payload List
2
2
3
3
#### SQL Injection
4
4
@@ -25,7 +25,29 @@ In some situations, an attacker can escalate an SQL injection attack to compromi
25
25
|Out-of-band SQLi|Out-of-band SQL Injection is not very common, mostly because it depends on features being enabled on the database server being used by the web application. Out-of-band SQL Injection occurs when an attacker is unable to use the same channel to launch the attack and gather results. Out-of-band techniques, offer an attacker an alternative to inferential time-based techniques, especially if the server responses are not very stable (making an inferential time-based attack unreliable).|
26
26
| Voice Based Sql Injection | It is a sql injection attack method that can be applied in applications that provide access to databases with voice command. An attacker could pull information from the database by sending sql queries with sound. |
27
27
28
-
Generic SQL Injection Payloads
28
+
#### SQL Injection Vulnerability Scanner Tool's :
29
+
30
+
*[SQLMap](https://github.com/sqlmapproject/sqlmap) – Automatic SQL Injection And Database Takeover Tool
31
+
32
+
*[jSQL Injection](https://github.com/ron190/jsql-injection) – Java Tool For Automatic SQL Database Injection
33
+
34
+
*[BBQSQL](https://github.com/Neohapsis/bbqsql) – A Blind SQL-Injection Exploitation Tool
0 commit comments