sqlilabs
Pentesting playground
An interactive platform for learning and practicing SQL Injection techniques through a web-based application.
Lab set-up for learning SQL Injection Techniques
93 stars
11 watching
38 forks
Language: JavaScript
last commit: almost 5 years ago learning-sql-injectionphprestore-databasesql-injection
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A tool to simplify tasks related to iOS pentesting and research by providing a GUI interface. | 944 |
| | A local penetration testing lab using Docker Compose to simulate various attack scenarios and systems vulnerabilities. | 182 |
| | A pentesting framework with shell integrations designed to automate workflows and streamline productivity. | 3 |
| | A comprehensive checklist for identifying vulnerabilities in Android apps | 194 |
| | A client-side PostgreSQL app with a query playground and ERD schema generator for learning and development purposes | 355 |
| | A tool designed to test the security of databases by automatically injecting malicious SQL code into web applications | 1,203 |
| | An AWS pentesting tool designed to demonstrate the impact of excessive permissions and expose sensitive resources to unauthorized access | 189 |
| | Provides a comprehensive guide to testing and analyzing mobile applications for security vulnerabilities | 280 |
| | A virtual network environment for learning penetration testing with pre-configured systems and tools. | 841 |
| | A platform for testing and experimenting with WebSocket servers. | 30 |
| | A Kubernetes-focused container assessment and context discovery tool for penetration testing. | 441 |
| | An interactive web application for testing and validating Zod schemas | 54 |
| | A virtual server playground for testing and developing web applications with PHP and Yii2 | 49 |
| | A cross-platform note-taking and target-tracking app designed to support penetration testers in bug bounty activities. | 892 |
| | A tool that automates the process of detecting and exploiting SQL injection vulnerabilities in web applications. | 425 |