Exploitation: Difference between revisions
		
		
		
		Jump to navigation
		Jump to search
		
| Line 14: | Line 14: | ||
* Tamper agent scripts for sqlmap (WAF bypass): https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423  | * Tamper agent scripts for sqlmap (WAF bypass): https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423  | ||
* https://github.com/r0oth3x49/ghauri  | * https://github.com/r0oth3x49/ghauri  | ||
* SQL Injection & XSS Playground: https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets/sql-injection-xss-playground#classic-sql-injection  | |||
=== Cross-site scripting (XSS) ===  | === Cross-site scripting (XSS) ===  | ||
Revision as of 23:59, 29 July 2023
Payloads
Metasploit
- Install on server: https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html
 
Public exploits
SQL injection (SQLi)
- https://github.com/sqlmapproject/sqlmap
 - Tamper agent scripts for sqlmap (WAF bypass): https://forum.bugcrowd.com/t/sqlmap-tamper-scripts-sql-injection-and-waf-bypass/423
 - https://github.com/r0oth3x49/ghauri
 - SQL Injection & XSS Playground: https://www.ired.team/offensive-security-experiments/offensive-security-cheetsheets/sql-injection-xss-playground#classic-sql-injection