an input box) is vulnerable to SQL injection is to supply it with a single quotation mark. This will terminate the string in a SQL statement, and if the input isn't filtered correctly, it will often return an error. Usually, if this happens, you can be pretty confide...
If you’re not familiar with vim, you can use arrows on your keyboard to navigate. Use the letterito ‘insert’ (allowing you to type), thenescapeand:xto save changes and exit the file. Once you save the file, you may have to restart apache and/or the PHP engine in order for the...
Note, if you are using MariaDB rather than MySQL (MariaDB is default in Kali), then you can't use the database root user, you must create a new database user. To do this, connect to the database as the root user then use the following commands: mysql> create database dvwa; Query...
DVWA is an open-source project made for security testing; it's a web application that is vulnerable by design; it's expected that users deploy it on their machines to use it. We will try to find instances on the Internet that already have it deployed to use it without installing it. T...
The art of fuzzing is a vital skill for any penetration tester or hacker to possess. The faster you fuzz, and the more efficiently you are at doing it, the...
Machine Learning for Cyber Security Curated list of tools and resources related to the use of machine learning for cyber security Payloads Collection of web attack payloads PayloadsAllTheThings List of useful payloads and bypass for Web Application Security and Pentest/CTF Pentest Cheatsheets Colle...
SQL(Structured Query Language): C/C++ Java: Python: Bash: Ruby: Golang: https://tour.golang.org/welcome/1 https://www.udemy.com/learn-go-the-complete-bootcamp-course-golang/ Exploit Development Resources⤴ Tools⤴ (Coming Soon)
Machine Learning for Cyber Security Curated list of tools and resources related to the use of machine learning for cyber security Payloads Collection of web attack payloads PayloadsAllTheThings List of useful payloads and bypass for Web Application Security and Pentest/CTF Pentest Cheatsheets Colle...