Structures, Queries and attack methodologies described on the DBMSs that I've exploited in CTFs.
Last updated 2 months ago