Search the Community

Showing results for tags 'sql'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 556 results

  1. sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections. The sqlmap project is currently searching for sponsor(s). Changelog v1.4.4 Couple of trivial refactorings [HIDE][Hidden Content]]
  2. MSSQLi-DUET - SQL Injection Script For MSSQL That Extracts Domain Users From An Active Directory Environment Based On RID Bruteforcing SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing. Supports various forms of WAF bypass techniques through the implementation of SQLmap tamper functions. Additional tamper functions can be incorporated by the user depending on the situation and environment. Comes in two flavors: straight-up Python script for terminal use, or a Burp Suite plugin for simple GUI navigation. Currently only supports union-based injection at the moment. More samples and test cases are required to fully test tool's functionality and accuracy. Feedback and comments are greatly welcomed if you encounter a situation it does not work. Custom tailoring the script and plugin to your needs should not be too difficult as well. Be sure to read the Notes section for some troubleshooting. Burp Suite Plugin After loading the plugin into Burp Suite, right-click on a request and send it to MSSQLi-DUET. More details on the parameters and such are described below. The request will populate in the request window, and only the fields above it need to be filled out. After hitting run the output will be placed in the results output box for easy copy pasting. [HIDE][Hidden Content]]
  3. [Hidden Content]
  4. In this course, we'll be looking at database management basics and SQL using the MySQL RDBMS. The course is designed for beginners to SQL and database management systems, and will introduce common database management topics. Throughout the course we'll be looking at various topics including schema design, basic C.R.U.D operations, aggregation, nested queries, joins, keys and much more. Contents (0:00) Introduction (2:36) What is a Database? (23:10) Tables & Keys (43:31) SQL Basics (52:26) MySQL Windows Installation (1:01:59) MySQL Mac Installation (1:15:49) Creating Tables (1:31:05) Inserting Data (1:38:17) Constraints (1:48:11) Update & Delete (1:56:11) Basic Queries (2:08:37) Company Database Intro (2:14:05) Creating Company Database (2:30:27 ) More Basic Queries (2:26:24) Functions (2:45:13) Wildcards (2:53:53) Union (3:01:36) Joins (3:11:49) Nested Queries (3:21:52) On Delete (3:30:05) Triggers (3:42:12) ER Diagrams Intro (3:55:53) Designing an ER Diagram (4:08:34) Converting ER Diagrams to Schemas [Hidden Content]
  5. SQL Injection In this section, we'll explain what SQL injection is, describe some common examples, explain how to find and exploit various kinds of SQL injection vulnerabilities, and summarize how to prevent SQL injection. What is SQL injection (SQLi)? SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior. In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack. [HIDE][Hidden Content]]
  6. [HIDE][Hidden Content]]
  7. 0x1

    HackBar V2

    Firefox Extension of HackBar without license A HackBar for new firefox (Firefox Quantum). This addon is written in webextension and alternatives to the XUL version of original Hackbar. How to use Press F12 to open hackbar Feature Load, split, execute url from address bar. Custom/add referrer url, User Agent, cookie. Tools: md5, sha1, sha256, rot13 encryption, url, base64 encoding, beautifier json data, sql, xss features. Shortcut Ctrl + Enter to execute FOREVER FREE Download && Code Source [Hidden Content]
  8. dEEpEst

    How Does SQL Injection Work?

    [Hidden Content]
  9. TheJshen contentManagementSystem version 1.04 suffers from a remote SQL injection vulnerability. View the full article
  10. Mr Blog PHP suffers from cross site scripting and remote SQL injection vulnerabilities. View the full article
  11. WordPress Google Review Slider plugin version 6.1 suffers from a remote SQL injection vulnerability. View the full article
  12. delpino73 Blue-Smiley-Organizer version 1.32 suffers from a remote SQL injection vulnerability. View the full article
  13. waldronmatt FullCalendar-BS4-PHP-MySQL-JSON version 1.21 suffers from a remote SQL injection vulnerability. View the full article
  14. AUO SunVeillance Monitoring System version 1.1.9e suffers from a remote SQL injection vulnerability. View the full article
  15. WordPress Sliced Invoices plugin versions 3.8.2 and below suffer from a remote SQL injection vulnerability. View the full article
  16. WiKID Systems 2FA Enterprise Server version 4.2.0-b2032 suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities. View the full article
  17. Joomla Sumoku component version 3.9.8 suffers from a remote SQL injection vulnerability. View the full article
  18. Joomla Vemod News Mailer component version 1.0 suffers from a remote SQL injection vulnerability. View the full article
  19. Joomla MediaLibrary component version 1.5.26 suffers from a remote SQL injection vulnerability. View the full article
  20. Joomla MisterEstate component version 1.5.26 suffers from a remote SQL injection vulnerability. View the full article
  21. Joomla Google Maps component version 1.0.4 suffers from a remote SQL injection vulnerability. View the full article
  22. Joomla Mad4Joomla component version 1.1.x suffers from a remote SQL injection vulnerability. View the full article
  23. Joomla Cactus component version 1.2.0 suffers from a remote SQL injection vulnerability. View the full article
  24. Joomla SwPhotoGallery component version 1.5.26 suffers from a remote SQL injection vulnerability. View the full article
  25. 1337day-Exploits

    SugarCRM 9.0.1 SQL Injection

    SugarCRM versions 9.0.1 and below suffer from multiple remote SQL injection vulnerabilities. View the full article