Some useful syntax reminders for SQL Injection into various databases. Informix: SQL Injection into Informix databases. MSSQL: SQL Injection into MSSQL databases. Oracle: SQL Injection into Oracle databases. MySQL: SQL Injection into MySQL databases. Postgres: SQL Injection into PostgreSQL databases. DB2: Finding a SQL injection vulnerability in a web application backed by DB2 isn’t too common in my experience. Ingres: Ingres seems to be one of the less common database backends for web applications, so I thought it would be worth installing it and making some notes to make my next Ingres-based web app test a little easier. SQL Injection cheatsheet, database, pentest, sqlinjection, 0
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Web inventory tool that captures screenshots of webpages and includes additional features for enhanced usability.
Simple script to check a domain's email protections and identify vulnerabilities.
FullHunt is a next-generation attack surface security platform that enables companies to discover, monitor, and secure their external attack surfaces.
Automate your reconnaissance process with AttackSurfaceMapper, a tool for mapping and analyzing network attack surfaces.
An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.
LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.
Automate OSINT for threat intelligence and attack surface mapping with SpiderFoot.
A search engine for the Internet of Things (IoT) that provides real-time information about connected devices.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.