Structures, Queries and attack methodologies described on the DBMSs that I've exploited in CTFs.
Last updated 7 months ago