Structures, Queries and attack methodologies described on the DBMSs that I've exploited in CTFs.
Last updated 6 months ago