🔓 Site vulnerável à ataques SQL INJECTION e XSS
-
Updated
Sep 26, 2020 - PHP
🔓 Site vulnerável à ataques SQL INJECTION e XSS
This is a cyber security university assignment which is consisted of two phases. On the first phase, students seperated in teams, must find and patch security vulnerabilities of an old eClass version on a 4-week period. On the second phase, all teams had to attack the patched eClass version of the other teams.
StealthSQL - Unlock the Stealthy World of SQL Injection! 🌐✨ Dive into the shadows of web security with StealthSQL. Harness the power of StealthSQL to silently unveil vulnerabilities in SQL databases. Conduct stealthy SQL injections, expose misconfigurations, and empower your security journey. 🕵️♂️🔐
It provides a vulnerable webserver (Apache) with html and php related scripts to configure the server. Also, some possible solutions are given to break the system.
🔐 Site seguro à ataques SQL INJECTION e XSS
We are going to go through some techniques and common PHP use cases for Website Security. Website security is often overlooked- and that’s understandable, but basic security can be put down to lots of techniques.
Lista de SQL Injection
A python application to protect websites against SQL injections
My team built a Machine Learning model to detect SQL Injections. The dataset was prepared by capturing normal and malicious HTTP requests, extracting essential features for training the model effectively. It enhances web application security by accurately identifying and flagging SQL Injection attacks.
Los(Lord of SQLinjection)에서의 문제를 풀고 정리하는 repo
A simple intrusion detection/prevention system framework written in PHP.
Skin Glow is a skin care online shop that provides users with the ability to view skin care products, register, log-in, edit profile, and purchase. Furthermore, provide the admins with main management options (add, delete, and view user's messages).
procedure infrastructure with injection handle
A PHP Library for Cryptographically Secure Token Generation and Management
SQL Injection Vulnerability Scanner made with Python
How to perform SQL injection using sqlmap tool.
Add a description, image, and links to the sql-injection-attacks topic page so that developers can more easily learn about it.
To associate your repository with the sql-injection-attacks topic, visit your repo's landing page and select "manage topics."