You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When tinkering with SQL injections, one thing I have seen beginners struggle and yet sometimes struggle with myself, is to wrap the head around the relation between the input field and how it will affect the SQL query executed. Therefore, I want to help learners and myself with this visualization aid.
In the context of my first internship during my computer science engineering course, I had the opportunity to be introduced to my first ever web development / cybersecurity project.
StealthSQL: The Ultimate SQL Injection Tool - Dive into the shadows of web security with StealthSQL. Harness the power of StealthSQL to silently unveil vulnerabilities in SQL databases. Conduct stealthy SQL injections, expose misconfigurations, and empower your security journey. 🕵️♂️🔐
My team built a Machine Learning model to detect SQL Injections. The dataset was prepared by capturing normal and malicious HTTP requests, extracting essential features for training the model effectively. It enhances web application security by accurately identifying and flagging SQL Injection attacks.