<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>appsec.fyi — SQLi</title>
  <link>https://appsec.fyi/sqli.html</link>
  <description>Curated SQLi resources from appsec.fyi</description>
  <language>en-us</language>
  <atom:link href="https://appsec.fyi/feeds/sqli.xml" rel="self" type="application/rss+xml"/>
  <lastBuildDate>Sun, 12 Apr 2026 04:12:19 +0000</lastBuildDate>
  <managingEditor>carl@chs.us (Carl Sampson)</managingEditor>
  <item>
    <title>SQL Injection in 2026: It Took One Apostrophe</title>
    <link>https://udayshelke17-40981.medium.com/sql-injection-in-2026-yes-and-it-took-one-apostrophe-39fed99c4ce3</link>
    <guid isPermaLink="true">https://udayshelke17-40981.medium.com/sql-injection-in-2026-yes-and-it-took-one-apostrophe-39fed99c4ce3</guid>
    <description>SQL Injection in 2026: It Took One Apostrophe</description>
    <category>SQLi</category>
    <pubDate>Fri, 10 Apr 2026 01:56:00 +0000</pubDate>
  </item>
  <item>
    <title>How to Learn SQL Injection Step by Step</title>
    <link>https://www.ethicalhackinginstitute.com/blog/how-to-learn-sql-injection-step-by-step-for-ceh</link>
    <guid isPermaLink="true">https://www.ethicalhackinginstitute.com/blog/how-to-learn-sql-injection-step-by-step-for-ceh</guid>
    <description>How to Learn SQL Injection Step by Step</description>
    <category>SQLi</category>
    <pubDate>Fri, 10 Apr 2026 01:55:59 +0000</pubDate>
  </item>
  <item>
    <title>Advanced SQL Injection Techniques in Modern Web Apps</title>
    <link>https://gauravsingh-cybersecurity.github.io/blog/2025/01/15/advanced-sql-injection-techniques.html</link>
    <guid isPermaLink="true">https://gauravsingh-cybersecurity.github.io/blog/2025/01/15/advanced-sql-injection-techniques.html</guid>
    <description>Advanced SQL Injection Techniques in Modern Web Apps</description>
    <category>SQLi</category>
    <pubDate>Fri, 10 Apr 2026 01:55:58 +0000</pubDate>
  </item>
  <item>
    <title>Bypassing WAF with Adversarial SQL</title>
    <link>https://dl.acm.org/doi/pdf/10.1145/3788286</link>
    <guid isPermaLink="true">https://dl.acm.org/doi/pdf/10.1145/3788286</guid>
    <description>Bypassing WAF with Adversarial SQL</description>
    <category>SQLi</category>
    <pubDate>Fri, 10 Apr 2026 01:55:57 +0000</pubDate>
  </item>
  <item>
    <title>WAF Bypass Using JSON-Based SQL Injection Attacks</title>
    <link>https://www.picussecurity.com/resource/blog/waf-bypass-using-json-based-sql-injection-attacks</link>
    <guid isPermaLink="true">https://www.picussecurity.com/resource/blog/waf-bypass-using-json-based-sql-injection-attacks</guid>
    <description>WAF Bypass Using JSON-Based SQL Injection Attacks</description>
    <category>SQLi</category>
    <pubDate>Fri, 10 Apr 2026 01:55:57 +0000</pubDate>
  </item>
  <item>
    <title>SQL Injection Security Vulnerabilities</title>
    <link>https://www.cvedetails.com/vulnerability-list/opsqli-1/sql-injection.html</link>
    <guid isPermaLink="true">https://www.cvedetails.com/vulnerability-list/opsqli-1/sql-injection.html</guid>
    <description>SQL Injection Security Vulnerabilities</description>
    <category>SQLi</category>
    <pubDate>Fri, 10 Apr 2026 01:43:31 +0000</pubDate>
  </item>
  <item>
    <title>CVE Search: SQL Injection</title>
    <link>https://www.cve.org/CVERecord/SearchResults?query=sql+injection</link>
    <guid isPermaLink="true">https://www.cve.org/CVERecord/SearchResults?query=sql+injection</guid>
    <description>CVE Search: SQL Injection</description>
    <category>SQLi</category>
    <pubDate>Fri, 10 Apr 2026 01:43:30 +0000</pubDate>
  </item>
  <item>
    <title>SQL Injection - OWASP</title>
    <link>https://owasp.org/www-community/attacks/SQL_Injection</link>
    <guid isPermaLink="true">https://owasp.org/www-community/attacks/SQL_Injection</guid>
    <description>SQL Injection - OWASP</description>
    <category>SQLi</category>
    <pubDate>Fri, 10 Apr 2026 01:43:28 +0000</pubDate>
  </item>
  <item>
    <title>SQL Injection Tutorial &amp; Examples - PortSwigger</title>
    <link>https://portswigger.net/web-security/sql-injection</link>
    <guid isPermaLink="true">https://portswigger.net/web-security/sql-injection</guid>
    <description>SQL Injection Tutorial &amp; Examples - PortSwigger</description>
    <category>SQLi</category>
    <pubDate>Fri, 10 Apr 2026 01:43:27 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-26116: SQL Server SQL Injection</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2026-26116/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2026-26116/</guid>
    <description>CVE-2026-26116: SQL Server SQL Injection</description>
    <category>SQLi</category>
    <pubDate>Fri, 10 Apr 2026 01:43:26 +0000</pubDate>
  </item>
  <item>
    <title>SQL Injection 2025 Advanced Exploitation &amp; Defense Guide</title>
    <link>https://broadchannel.org/sql-injection-database-exploitation-guide/</link>
    <guid isPermaLink="true">https://broadchannel.org/sql-injection-database-exploitation-guide/</guid>
    <description>SQL Injection 2025 Advanced Exploitation &amp; Defense Guide</description>
    <category>SQLi</category>
    <pubDate>Fri, 10 Apr 2026 01:43:26 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-25257: Critical SQLi in Fortinet FortiWeb</title>
    <link>https://socprime.com/blog/cve-2025-25257-sql-injection-vulnerability/</link>
    <guid isPermaLink="true">https://socprime.com/blog/cve-2025-25257-sql-injection-vulnerability/</guid>
    <description>CVE-2025-25257: Critical SQLi in Fortinet FortiWeb</description>
    <category>SQLi</category>
    <pubDate>Fri, 10 Apr 2026 01:43:25 +0000</pubDate>
  </item>
  <item>
    <title>SQL Injection (SQLi) Guide - SecPortal</title>
    <link>https://secportal.io/vulnerabilities/sql-injection</link>
    <guid isPermaLink="true">https://secportal.io/vulnerabilities/sql-injection</guid>
    <description>SQL Injection (SQLi) Guide - SecPortal</description>
    <category>SQLi</category>
    <pubDate>Mon, 06 Apr 2026 02:01:59 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-27697: Basercms SQLi Vulnerability</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2026-27697/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2026-27697/</guid>
    <description>CVE-2026-27697: Basercms SQLi Vulnerability</description>
    <category>SQLi</category>
    <pubDate>Mon, 06 Apr 2026 02:01:58 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-5197: Student Membership System SQLi Vulnerability</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2026-5197/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2026-5197/</guid>
    <description>CVE-2026-5197: Student Membership System SQLi Vulnerability</description>
    <category>SQLi</category>
    <pubDate>Mon, 06 Apr 2026 02:01:57 +0000</pubDate>
  </item>
  <item>
    <title>WAF Testing Guide: How to Validate Web Application Firewalls</title>
    <link>https://www.picussecurity.com/resource/blog/waf-testing-guide-how-to-validate-web-application-firewalls-with-bas</link>
    <guid isPermaLink="true">https://www.picussecurity.com/resource/blog/waf-testing-guide-how-to-validate-web-application-firewalls-with-bas</guid>
    <description>WAF Testing Guide: How to Validate Web Application Firewalls</description>
    <category>SQLi</category>
    <pubDate>Mon, 06 Apr 2026 02:01:55 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty Bootcamp #29: Boolean Blind SQL Injection Part 2</title>
    <link>https://infosecwriteups.com/bug-bounty-bootcamp-29-boolean-blind-sql-injection-part-2-extracting-usernames-and-passwords-13447abeb6d6</link>
    <guid isPermaLink="true">https://infosecwriteups.com/bug-bounty-bootcamp-29-boolean-blind-sql-injection-part-2-extracting-usernames-and-passwords-13447abeb6d6</guid>
    <description>Bug Bounty Bootcamp #29: Boolean Blind SQL Injection Part 2</description>
    <category>SQLi</category>
    <pubDate>Mon, 06 Apr 2026 02:01:54 +0000</pubDate>
  </item>
  <item>
    <title>12 Questions and Answers About Insecure Deserialization</title>
    <link>https://www.securityscientist.net/blog/12-questions-and-answers-about-insecure-deserialization-code-flaw/</link>
    <guid isPermaLink="true">https://www.securityscientist.net/blog/12-questions-and-answers-about-insecure-deserialization-code-flaw/</guid>
    <description>12 Questions and Answers About Insecure Deserialization</description>
    <category>SQLi</category>
    <pubDate>Fri, 03 Apr 2026 15:55:54 +0000</pubDate>
  </item>
  <item>
    <title>How to Perform SQL Injection in Web Apps</title>
    <link>https://www.ethicalhackinginstitute.com/blog/how-to-perform-sql-injection-in-web-apps-for-ceh</link>
    <guid isPermaLink="true">https://www.ethicalhackinginstitute.com/blog/how-to-perform-sql-injection-in-web-apps-for-ceh</guid>
    <description>How to Perform SQL Injection in Web Apps</description>
    <category>SQLi</category>
    <pubDate>Fri, 03 Apr 2026 15:55:53 +0000</pubDate>
  </item>
  <item>
    <title>What is SQL Injection? How to Prevent SQL Injection | Fortinet</title>
    <link>https://www.fortinet.com/resources/cyberglossary/sql-injection</link>
    <guid isPermaLink="true">https://www.fortinet.com/resources/cyberglossary/sql-injection</guid>
    <description>What is SQL Injection? How to Prevent SQL Injection | Fortinet</description>
    <category>SQLi</category>
    <pubDate>Fri, 03 Apr 2026 15:55:52 +0000</pubDate>
  </item>
  <item>
    <title>Bypassing WAFs in 2025: New Techniques and Evasion Tactics</title>
    <link>https://medium.com/@gasmask/bypassing-wafs-in-2025-new-techniques-and-evasion-tactics-fdb3508e6b46</link>
    <guid isPermaLink="true">https://medium.com/@gasmask/bypassing-wafs-in-2025-new-techniques-and-evasion-tactics-fdb3508e6b46</guid>
    <description>Bypassing WAFs in 2025: New Techniques and Evasion Tactics</description>
    <category>SQLi</category>
    <pubDate>Fri, 03 Apr 2026 15:55:50 +0000</pubDate>
  </item>
  <item>
    <title>7 Types of SQL Injection Attacks &amp; How to Prevent Them</title>
    <link>https://www.sentinelone.com/cybersecurity-101/cybersecurity/types-of-sql-injection/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/cybersecurity-101/cybersecurity/types-of-sql-injection/</guid>
    <description>7 Types of SQL Injection Attacks &amp; How to Prevent Them</description>
    <category>SQLi</category>
    <pubDate>Fri, 03 Apr 2026 15:55:48 +0000</pubDate>
  </item>
  <item>
    <title>SQLi Payloads - Classic, Blind, Error-Based, Time-Based, WAF Bypass</title>
    <link>https://github.com/shehrozmajeed/SQLi_Payload</link>
    <guid isPermaLink="true">https://github.com/shehrozmajeed/SQLi_Payload</guid>
    <description>SQLi Payloads - Classic, Blind, Error-Based, Time-Based, WAF Bypass</description>
    <category>SQLi</category>
    <pubDate>Fri, 03 Apr 2026 15:55:47 +0000</pubDate>
  </item>
  <item>
    <title>SQL Injection for Bug Bounty Hunters | YesWeHack</title>
    <link>https://www.yeswehack.com/learn-bug-bounty/vulnerability-vectors-sql-injection</link>
    <guid isPermaLink="true">https://www.yeswehack.com/learn-bug-bounty/vulnerability-vectors-sql-injection</guid>
    <description>SQL Injection for Bug Bounty Hunters | YesWeHack</description>
    <category>SQLi</category>
    <pubDate>Fri, 03 Apr 2026 15:55:45 +0000</pubDate>
  </item>
  <item>
    <title>Exploiting an SQL Injection with WAF Bypass</title>
    <link>https://www.vaadata.com/blog/exploiting-an-sql-injection-with-waf-bypass/</link>
    <guid isPermaLink="true">https://www.vaadata.com/blog/exploiting-an-sql-injection-with-waf-bypass/</guid>
    <description>Exploiting an SQL Injection with WAF Bypass</description>
    <category>SQLi</category>
    <pubDate>Fri, 03 Apr 2026 15:55:44 +0000</pubDate>
  </item>
  <item>
    <title>SQL Injection Bypassing WAF | OWASP</title>
    <link>https://owasp.org/www-community/attacks/SQL_Injection_Bypassing_WAF</link>
    <guid isPermaLink="true">https://owasp.org/www-community/attacks/SQL_Injection_Bypassing_WAF</guid>
    <description>SQL Injection Bypassing WAF | OWASP</description>
    <category>SQLi</category>
    <pubDate>Fri, 03 Apr 2026 15:55:43 +0000</pubDate>
  </item>
  <item>
    <title>PayloadsAllTheThings - SQL Injection</title>
    <link>https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/README.md</link>
    <guid isPermaLink="true">https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/SQL%20Injection/README.md</guid>
    <description>PayloadsAllTheThings - SQL Injection</description>
    <category>SQLi</category>
    <pubDate>Fri, 03 Apr 2026 15:55:42 +0000</pubDate>
  </item>
  <item>
    <title>TrinetLayer</title>
    <link>https://trinetlayer.com/homepage</link>
    <guid isPermaLink="true">https://trinetlayer.com/homepage</guid>
    <description>A battle-tested TrinetLayer for vulnerability research, real-world exploit payloads, and modern attack techniques — crafted by hackers, trusted by hackers.</description>
    <category>SQLi</category>
    <pubDate>Mon, 19 Jan 2026 00:15:28 +0000</pubDate>
  </item>
  <item>
    <title>NucleiFuzzer - Powerful Automation Tool For Detecting XSS, SQLi, SSRF, Open</title>
    <link>https://www.kitploit.com/2023/09/nucleifuzzer-powerful-automation-tool.html?m=1</link>
    <guid isPermaLink="true">https://www.kitploit.com/2023/09/nucleifuzzer-powerful-automation-tool.html?m=1</guid>
    <description>&quot;NucleiFuzzer is an automation tool designed for detecting vulnerabilities like XSS, SQLi, SSRF, and Open. It offers powerful capabilities for automated security testing.&quot;</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:11:12 +0000</pubDate>
  </item>
  <item>
    <title>https://weekly.infosecwriteups.com/iw-weekly-39-10-000-bounty-zero-click-account-takeover-stored-xss-open-redirection-vulnerability-sql-injection-rce-reconnaissance-techniques-and-much-more/</title>
    <link>https://weekly.infosecwriteups.com/iw-weekly-39-10-000-bounty-zero-click-account-takeover-stored-xss-open-redirection-vulnerability-sql-injection-rce-reconnaissance-techniques-and-much-more/</link>
    <guid isPermaLink="true">https://weekly.infosecwriteups.com/iw-weekly-39-10-000-bounty-zero-click-account-takeover-stored-xss-open-redirection-vulnerability-sql-injection-rce-reconnaissance-techniques-and-much-more/</guid>
    <description>The content discusses various cybersecurity topics covered in the IW Weekly 39, including a $10,000 bounty for zero-click account takeover, stored XSS, open redirection vulnerability, SQL injection, RCE, and reconnaissance techniques. It provides insights into these security issues and offers valuable information for individuals interested in cybersecurity.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:11:08 +0000</pubDate>
  </item>
  <item>
    <title>https://github.com/yeswehack/vulnerable-code-snippets</title>
    <link>https://github.com/yeswehack/vulnerable-code-snippets</link>
    <guid isPermaLink="true">https://github.com/yeswehack/vulnerable-code-snippets</guid>
    <description>The provided link leads to a GitHub repository named &quot;vulnerable-code-snippets&quot; by YesWeHack. The repository likely contains code snippets that demonstrate common vulnerabilities in software. It serves as a resource for developers to understand and learn about potential security flaws in their code. By exploring the repository, developers can gain insights into how vulnerabilities can be introduced and how to avoid them in their own projects.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:11:08 +0000</pubDate>
  </item>
  <item>
    <title>SQL Injection Wiki</title>
    <link>https://sqlwiki.netspi.com/</link>
    <guid isPermaLink="true">https://sqlwiki.netspi.com/</guid>
    <description>The content provided is simply the title &quot;SQL Injection Wiki.&quot; It appears to be a reference to a wiki page or resource specifically focused on SQL injection. SQL injection is a common cyber attack method where malicious SQL queries are inserted into input fields to manipulate databases. The wiki likely contains information, examples, and resources related to SQL injection attacks, prevention techniques, and best practices for securing databases against such vulnerabilities.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:11:02 +0000</pubDate>
  </item>
  <item>
    <title>Efficient Time Based Blind SQL Injection using MySQL Bit Functions and Oper</title>
    <link>https://stealingthe.network/efficient-time-based-blind-sql-injection-using-mysql-bit-functions-and-operators/</link>
    <guid isPermaLink="true">https://stealingthe.network/efficient-time-based-blind-sql-injection-using-mysql-bit-functions-and-operators/</guid>
    <description>The content discusses a method of conducting a Time-Based Blind SQL Injection attack using MySQL Bit Functions and Operators. This technique allows attackers to extract information from a database by manipulating the response time of the server. By leveraging MySQL Bit Functions and Operators, attackers can efficiently extract data without directly viewing the results, making it harder to detect the intrusion. This approach is useful for hackers seeking to exploit vulnerabilities in web applications and gain unauthorized access to sensitive information stored in databases.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:11:00 +0000</pubDate>
  </item>
  <item>
    <title>http://www.darknet.org.uk/2017/09/bsqlinjector-blind-sql-injection-tool-download-ruby/</title>
    <link>http://www.darknet.org.uk/2017/09/bsqlinjector-blind-sql-injection-tool-download-ruby/</link>
    <guid isPermaLink="true">http://www.darknet.org.uk/2017/09/bsqlinjector-blind-sql-injection-tool-download-ruby/</guid>
    <description>The content discusses BSQLinjector, a tool for conducting blind SQL injection attacks, available for download in Ruby. Blind SQL injection is a type of attack where an attacker can send SQL queries to a database and observe the application&#x27;s response to extract information. BSQLinjector automates this process, making it easier for attackers to exploit vulnerabilities in web applications. The tool can be used to test the security of web applications and identify potential weaknesses that could be exploited by malicious actors.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:10:56 +0000</pubDate>
  </item>
  <item>
    <title>SQL Attack (Constraint-based) - Dhaval Kapil</title>
    <link>https://dhavalkapil.com/blogs/SQL-Attack-Constraint-Based/</link>
    <guid isPermaLink="true">https://dhavalkapil.com/blogs/SQL-Attack-Constraint-Based/</guid>
    <description>The content provided is a title mentioning a specific type of SQL attack known as Constraint-based SQL attack, attributed to an individual named Dhaval Kapil. This type of attack likely involves exploiting constraints within a database system to manipulate or retrieve unauthorized data. The content is concise and does not provide further details or explanations about the attack itself.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:10:54 +0000</pubDate>
  </item>
  <item>
    <title>SQL Injection Cheat Sheet by Netsparker</title>
    <link>https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/</link>
    <guid isPermaLink="true">https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/</guid>
    <description>The SQL Injection Cheat Sheet by Netsparker provides a comprehensive guide to SQL injection attacks. It likely includes common SQL injection techniques, payloads, and examples to help security professionals understand and prevent such vulnerabilities in web applications.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:10:52 +0000</pubDate>
  </item>
  <item>
    <title>Vulnerability analysis, Security Papers, Exploit Tutorials - Part 12975</title>
    <link>https://www.exploit-db.com/papers/12975/</link>
    <guid isPermaLink="true">https://www.exploit-db.com/papers/12975/</guid>
    <description>The content discusses vulnerability analysis, security papers, and exploit tutorials in Part 12975. It likely covers topics related to identifying weaknesses in systems, research papers on security issues, and guides on exploiting vulnerabilities. This information can be valuable for individuals interested in cybersecurity, helping them understand and address potential security risks in systems and applications.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:10:50 +0000</pubDate>
  </item>
  <item>
    <title>https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/</title>
    <link>https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/</link>
    <guid isPermaLink="true">https://secnhack.in/website-penetration-testing-and-database-hacking-with-sqlmap/</guid>
    <description>The content discusses website penetration testing and database hacking using a tool called SQLMap. It covers the process of testing the security of websites and databases for vulnerabilities that could be exploited by attackers. The article likely provides guidance on how to use SQLMap to identify and exploit SQL injection vulnerabilities, a common method used by hackers to gain unauthorized access to databases. It may also include information on how to protect against such attacks by implementing security measures to prevent SQL injection.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:10:42 +0000</pubDate>
  </item>
  <item>
    <title>Awesome Bug Bounty Tools</title>
    <link>https://github.com/vavkamil/awesome-bugbounty-tools</link>
    <guid isPermaLink="true">https://github.com/vavkamil/awesome-bugbounty-tools</guid>
    <description>The content is titled &quot;Awesome Bug Bounty Tools&quot; and simply states the topic without providing any specific information or details about bug bounty tools.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:10:36 +0000</pubDate>
  </item>
  <item>
    <title>SQL Injection Cheatsheet 2021</title>
    <link>https://hackersonlineclub.com/sql-injection-cheatsheet/</link>
    <guid isPermaLink="true">https://hackersonlineclub.com/sql-injection-cheatsheet/</guid>
    <description>The content provided is a title mentioning &quot;SQL Injection Cheatsheet 2021.&quot; It suggests that there is a cheatsheet available for SQL injection techniques and vulnerabilities that are relevant for the year 2021. SQL injection is a common web application security vulnerability that allows attackers to interfere with the queries that an application makes to its database. The cheatsheet likely contains information on how to exploit these vulnerabilities and protect against them.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:10:34 +0000</pubDate>
  </item>
  <item>
    <title>https://medium.com/bugbountywriteup/sql-injection-time-and-boolean-based-27239b6a55e8?source=twitterShare-1764222123d3-1576594710&amp;_referrer=twitter&amp;_branch_match_id=732557985002302401</title>
    <link>https://medium.com/bugbountywriteup/sql-injection-time-and-boolean-based-27239b6a55e8?source=twitterShare-1764222123d3-1576594710&amp;_referrer=twitter&amp;_branch_match_id=732557985002302401</link>
    <guid isPermaLink="true">https://medium.com/bugbountywriteup/sql-injection-time-and-boolean-based-27239b6a55e8?source=twitterShare-1764222123d3-1576594710&amp;_referrer=twitter&amp;_branch_match_id=732557985002302401</guid>
    <description>The content discusses SQL injection vulnerabilities, specifically focusing on time-based and boolean-based techniques. It explains how these methods can be exploited to manipulate database queries and extract sensitive information. The article likely provides examples, demonstrations, and insights on how to identify and mitigate SQL injection vulnerabilities in web applications. It is a valuable resource for bug bounty hunters, security researchers, and developers looking to enhance their understanding of SQL injection attacks.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:10:32 +0000</pubDate>
  </item>
  <item>
    <title>https://link.medium.com/q4mazES8o2</title>
    <link>https://link.medium.com/q4mazES8o2</link>
    <guid isPermaLink="true">https://link.medium.com/q4mazES8o2</guid>
    <description>I&#x27;m sorry, but I cannot access external content or links. If you provide me with the main points or key ideas from the content, I can help you summarize it in 100 words or less.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:10:30 +0000</pubDate>
  </item>
  <item>
    <title>https://vavkamil.cz/2019/10/09/understanding-the-full-potential-of-sqlmap-during-bug-bounty-hunting/</title>
    <link>https://vavkamil.cz/2019/10/09/understanding-the-full-potential-of-sqlmap-during-bug-bounty-hunting/</link>
    <guid isPermaLink="true">https://vavkamil.cz/2019/10/09/understanding-the-full-potential-of-sqlmap-during-bug-bounty-hunting/</guid>
    <description>The content discusses maximizing the capabilities of SQLmap for bug bounty hunting. It covers understanding SQL injection vulnerabilities, using SQLmap to automate the process of exploiting these vulnerabilities, and tips for effective bug bounty hunting. The article emphasizes the importance of thorough testing and proper understanding of SQLmap&#x27;s features to achieve successful results in identifying and exploiting vulnerabilities. It provides insights into leveraging SQLmap effectively to enhance bug bounty hunting efforts and improve the overall security posture of web applications.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:10:28 +0000</pubDate>
  </item>
  <item>
    <title>https://portswigger.net/web-security/sql-injection/cheat-sheet</title>
    <link>https://portswigger.net/web-security/sql-injection/cheat-sheet</link>
    <guid isPermaLink="true">https://portswigger.net/web-security/sql-injection/cheat-sheet</guid>
    <description>The provided link leads to a cheat sheet on SQL injection from PortSwigger, a web security resource. The cheat sheet likely contains valuable information on SQL injection techniques, syntax, and examples to help individuals understand and prevent SQL injection attacks. It serves as a quick reference guide for developers and security professionals to enhance their knowledge and protect web applications from this common vulnerability.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:10:24 +0000</pubDate>
  </item>
  <item>
    <title>https://link.medium.com/0Scc0MzsTU</title>
    <link>https://link.medium.com/0Scc0MzsTU</link>
    <guid isPermaLink="true">https://link.medium.com/0Scc0MzsTU</guid>
    <description>I&#x27;m unable to access external content such as the one you provided. If you can provide the main points or key ideas from the content, I&#x27;d be happy to help summarize it for you.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:10:22 +0000</pubDate>
  </item>
  <item>
    <title>SQL Injection 101: Common Defense Methods Hackers Should Be Aware Of</title>
    <link>https://null-byte.wonderhowto.com/how-to/sql-injection-101-common-defense-methods-hackers-should-be-aware-0185138/</link>
    <guid isPermaLink="true">https://null-byte.wonderhowto.com/how-to/sql-injection-101-common-defense-methods-hackers-should-be-aware-0185138/</guid>
    <description>The content is likely to cover common defense methods against SQL injection attacks that hackers should be aware of. SQL injection is a type of cyber attack where malicious SQL statements are inserted into an input field, potentially allowing unauthorized access to a database. By understanding and implementing defense methods, hackers can protect their systems from SQL injection vulnerabilities.</description>
    <category>SQLi</category>
    <pubDate>Thu, 14 Aug 2025 04:10:16 +0000</pubDate>
  </item>
  <item>
    <title>ssrf</title>
    <link>https://notchxor.github.io/oscp-notes/2-web/ssrf/</link>
    <guid isPermaLink="true">https://notchxor.github.io/oscp-notes/2-web/ssrf/</guid>
    <description>The content is a brief mention of &quot;ssrf&quot; with a link provided to a URL: https://ift.tt/vybYKpI. It appears to be a concise reference to Server-Side Request Forgery (SSRF), a security vulnerability that allows an attacker to manipulate the server into making unintended requests. The link may lead to more information or resources related to SSRF.</description>
    <category>SQLi</category>
    <pubDate>Tue, 31 Oct 2023 12:47:38 +0000</pubDate>
  </item>
  <item>
    <title>How to turn SQL injection into an RCE or a file read? Case study of 128 bug bounty reports</title>
    <link>https://www.youtube.com/watch?v=ClnVdYf4PK0</link>
    <guid isPermaLink="true">https://www.youtube.com/watch?v=ClnVdYf4PK0</guid>
    <description>The content discusses techniques for leveraging SQL injection vulnerabilities to achieve Remote Code Execution (RCE) or unauthorized file reads. It presents a case study based on 128 bug bounty reports, likely demonstrating real-world examples of such exploits. Viewers can gain insights into the process of escalating SQL injection vulnerabilities into more severe security breaches. The content is likely to provide practical examples and strategies for security researchers or professionals interested in understanding and mitigating these types of cyber threats.</description>
    <category>SQLi</category>
    <pubDate>Fri, 22 Sep 2023 15:32:09 +0000</pubDate>
  </item>
  <item>
    <title>SQL Injection in GraphQL</title>
    <link>https://0xgad.medium.com/sql-injection-in-graphql-2859c96547a8</link>
    <guid isPermaLink="true">https://0xgad.medium.com/sql-injection-in-graphql-2859c96547a8</guid>
    <description>The content discusses the vulnerability of SQL injection in GraphQL, a query language for APIs. This security risk can occur when user input is not properly sanitized, allowing malicious actors to manipulate queries and potentially access or modify sensitive data in the database. It emphasizes the importance of input validation and sanitization to prevent SQL injection attacks in GraphQL applications.</description>
    <category>SQLi</category>
    <pubDate>Thu, 03 Nov 2022 15:33:51 +0000</pubDate>
  </item>
  <item>
    <title>DVWA 1.9+: Blind SQL Injection with SQLMap</title>
    <link>https://link.medium.com/dFZC5KiSvfb</link>
    <guid isPermaLink="true">https://link.medium.com/dFZC5KiSvfb</guid>
    <description>The content discusses performing Blind SQL Injection on DVWA 1.9+ using SQLMap. It follows a previous article on manual SQL Injection with OWASP ZAP. The focus is on hacking DVWA through Blind SQL Injection techniques.</description>
    <category>SQLi</category>
    <pubDate>Fri, 16 Apr 2021 22:01:36 +0000</pubDate>
  </item>
</channel>
</rss>