sql-injection-payload-list
IntruderPayloads
sql-injection-payload-list | IntruderPayloads | |
---|---|---|
5 | 2 | |
4,327 | 3,526 | |
2.4% | - | |
0.0 | 1.8 | |
5 months ago | over 2 years ago | |
BlitzBasic | ||
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
sql-injection-payload-list
- SQL injection mass list request?
- SC
-
I'm in. Right?...right?
SQL Injection Payloads
-
How an Interview with Mark Zuckerberg Started [The Interviewer is Lex Fridman]
Hi 1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055
-
🔥 A curated list of awesome links related to MySQL configuration performance tuning
https://github.com/payloadbox/sql-injection-payload-list This should be added hehe
IntruderPayloads
-
AI-powered Bing Chat spills its secrets via prompt injection attack
It's very interesting that AppSec may now begin to include "prompt injection" attacks as something of relevance.
Specifically with libraries like LangChain[0] that allow for you to perform complex actions ("What's the weather?" -> makes HTTP request to fetch weather) then we end up in a world where injection attacks can have side effects with security implications.
I've been thinking about what security might look like for a post-ChatGPT world and how I'd attempt to defend against it. I'd probably start by building a database of attack prompts, kind of like this[1] fuzz list but for AI, then I'd train a second neural net that acts like an adversarial neural network[2] to try to exploit the system based on those payloads. The end result would sort of like SQLMap[3] but for AI systems where it can automatically "leak" hidden prompts and potentially find "bypasses" to escape the sandbox.
Has anybody else spent any time thinking about how to defend systems against prompt injection attacks that have possible side effects (like making an HTTP request)?
0: https://langchain.readthedocs.io/en/latest/modules/agents/ex...
1: https://github.com/1N3/IntruderPayloads
2: https://en.wikipedia.org/wiki/Generative_adversarial_network
3: https://sqlmap.org/
-
Passed OSCP (70+10)! Experience sharing!
nmap, hacktricks and burpsuite are my best friend on enumeration. Search every port on hacktricks, fuzz every field in your web request on burpsuite using https://github.com/1N3/IntruderPayloads. Don't forget to try bruteforce if everything failed.
What are some alternatives?
ssti-payloads - 🎯 Server Side Template Injection Payloads
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF
vaf - Vaf is a cross-platform very advanced and fast web fuzzer written in nim
awesome-mysql-performance - 🔥 A curated list of awesome links related to MySQL / MariaDB / Percona performance tuning
dicectf-2023-challenges - All challenges from DiceCTF 2023
pixload - Image Payload Creating/Injecting tools
SQLMap - Automatic SQL injection and database takeover tool
command-injection-payload-list - 🎯 Command Injection Payload List
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
bugbounty-cheatsheet - A list of interesting payloads, tips and tricks for bug bounty hunters.
PENTESTING-BIBLE - articles