Skip to content

Commit 40f1a6e

Browse files
author
İsmail Taşdelen
authored
Update README.md
1 parent 361ed31 commit 40f1a6e

File tree

1 file changed

+29
-7
lines changed

1 file changed

+29
-7
lines changed

README.md

+29-7
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# SQL Injection Payload List
1+
### SQL Injection Payload List
22

33
#### SQL Injection
44

@@ -25,7 +25,29 @@ In some situations, an attacker can escalate an SQL injection attack to compromi
2525
|Out-of-band SQLi|Out-of-band SQL Injection is not very common, mostly because it depends on features being enabled on the database server being used by the web application. Out-of-band SQL Injection occurs when an attacker is unable to use the same channel to launch the attack and gather results. Out-of-band techniques, offer an attacker an alternative to inferential time-based techniques, especially if the server responses are not very stable (making an inferential time-based attack unreliable).|
2626
| Voice Based Sql Injection | It is a sql injection attack method that can be applied in applications that provide access to databases with voice command. An attacker could pull information from the database by sending sql queries with sound. |
2727

28-
Generic SQL Injection Payloads
28+
#### SQL Injection Vulnerability Scanner Tool's :
29+
30+
* [SQLMap](https://github.com/sqlmapproject/sqlmap) – Automatic SQL Injection And Database Takeover Tool
31+
32+
* [jSQL Injection](https://github.com/ron190/jsql-injection) – Java Tool For Automatic SQL Database Injection
33+
34+
* [BBQSQL](https://github.com/Neohapsis/bbqsql) – A Blind SQL-Injection Exploitation Tool
35+
36+
* [NoSQLMap](https://github.com/codingo/NoSQLMap) – Automated NoSQL Database Pwnage
37+
38+
* [Whitewidow](https://www.kitploit.com/2017/05/whitewidow-sql-vulnerability-scanner.html) – SQL Vulnerability Scanner
39+
40+
* [DSSS](https://github.com/stamparm/DSSS) – Damn Small SQLi Scanner
41+
42+
* [explo](https://github.com/dtag-dev-sec/explo) – Human And Machine Readable Web Vulnerability Testing Format
43+
44+
* [Blind-Sql-Bitshifting](https://github.com/awnumar/blind-sql-bitshifting) – Blind SQL-Injection via Bitshifting
45+
46+
* [Leviathan](https://github.com/leviathan-framework/leviathan) – Wide Range Mass Audit Toolkit
47+
48+
* [Blisqy](https://github.com/JohnTroony/Blisqy) – Exploit Time-based blind-SQL-injection in HTTP-Headers (MySQL/MariaDB)
49+
50+
#### Generic SQL Injection Payloads
2951

3052
```
3153
'
@@ -118,7 +140,7 @@ Comments:
118140
` Backtick
119141
```
120142

121-
Generic Error Based Payloads
143+
#### Generic Error Based Payloads
122144

123145
```
124146
OR 1=1
@@ -277,7 +299,7 @@ IF(7423=7423) SELECT 7423 ELSE DROP FUNCTION xcjl--
277299
and (select substring(@@version,3,1))='X'
278300
```
279301

280-
Generic Time Based SQL Injection Payloads
302+
#### Generic Time Based SQL Injection Payloads
281303

282304
```
283305
# from wapiti
@@ -377,7 +399,7 @@ OR 2947=LIKE('ABCDEFG',UPPER(HEX(RANDOMBLOB(1000000000/2))))
377399
SLEEP(1)/*' or SLEEP(1) or '" or SLEEP(1) or "*/
378400
```
379401

380-
Generic Union Select Payloads
402+
#### Generic Union Select Payloads
381403

382404
```
383405
ORDER BY SLEEP(5)
@@ -801,7 +823,7 @@ Generic Union Select Payloads
801823
UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25#
802824
```
803825

804-
SQL Injection Auth Bypass Payloads
826+
#### SQL Injection Auth Bypass Payloads
805827

806828
```
807829
'-'
@@ -883,7 +905,7 @@ admin") or "1"="1"/*
883905
1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055
884906
```
885907

886-
References :
908+
#### References :
887909

888910
* SQL Injection ( OWASP )
889911

0 commit comments

Comments
 (0)