SQL Injection Labs Logo

SQL Injection Labs

1
Free
Visit Website

This project is developed for the pentester who are learning SQL Injection, so that they can get a playground to apply their different wired concepts. Please don't use your SQL Injection skills anywhere where you don't have legal permission. Applying it on Live Websites is illegal and if you do so you have to face legal consequences. You can download the project from Github Requirements: - Web Server (e.g. Apache) - PHP 5 or greater - MySQL Installation Download the zipfile of the application and extract Move the files to Web server folder Edit pre-defined WEBROOT variable in php-inc/settings.php to the URL of sqlilabs directory Open Browser the and the type the URL where the files are located (e.g http://localhost/sqlilabs) Then click on the Setup > Configuration Set the Database connection details and the Web Root path and create the files Then Click on Create/Restore Database and click on Create/Restore Database button to create the database Now you can start experimenting with the Examples CONTRIBUTE: If have any idea you want to implement or think that there is a better way to implement any part please create a pull request and I will do my best to merge appropriate

FEATURES

ALTERNATIVES

Research project on bypassing default Falco ruleset with Dockerfile for sshayb/fuber:latest image.

Learn about 'Admin Free' Active Directory and the significance of privileged groups in AD.

A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.

A university course focused on vulnerability research, reverse engineering, and binary exploitation to teach practical offensive security skills.

Linux-based operating system intentionally vulnerable for cybersecurity practice.

A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.

Comprehensive tutorial series on ARM Assembly covering various topics.

A comprehensive guide to navigating the world of secure messaging apps, providing insights and recommendations to help you make an informed decision.

PINNED

InfoSecHired Logo

InfoSecHired

An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Commercial
Resources
Mandos Brief Newsletter Logo

Mandos Brief Newsletter

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Free
Resources
Kriptos Logo

Kriptos

An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.

Commercial
Data Protection
System Two Security Logo

System Two Security

An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

Commercial
Security Operations
Aikido Security Logo

Aikido Security

Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.

Commercial
Application Security
Permiso Logo

Permiso

Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.

Commercial
IAM
Wiz Logo

Wiz

Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.

Commercial
Cloud Security
Adversa AI Logo

Adversa AI

Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.

Commercial
AI Security