Skip to content
#

sql-injection-exploitation

Here are 38 public repositories matching this topic...

StealthSQL - Unlock the Stealthy World of SQL Injection! 🌐✨ Dive into the shadows of web security with StealthSQL. Harness the power of StealthSQL to silently unveil vulnerabilities in SQL databases. Conduct stealthy SQL injections, expose misconfigurations, and empower your security journey. 🕵️‍♂️🔐

  • Updated Jan 22, 2024
  • Shell

Skin Glow is a skin care online shop that provides users with the ability to view skin care products, register, log-in, edit profile, and purchase. Furthermore, provide the admins with main management options (add, delete, and view user's messages).

  • Updated May 21, 2022
  • CSS

This is a project involving the setting up a penetration testing environment using Kali Linux and Metasploitable2 to practice and exploit common vulnerabilities such as SQL Injection, Command Injection, and Cross-Site Scripting (XSS). Tools used include Nmap, BurpSuite, and SQLmap.

  • Updated May 24, 2024

Improve this page

Add a description, image, and links to the sql-injection-exploitation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the sql-injection-exploitation topic, visit your repo's landing page and select "manage topics."

Learn more