Structures, Queries and attack methodologies described on the DBMSs that I've exploited in CTFs.
Last updated 5 months ago