package testutils import ( "crypto/rand" "crypto/sha256" "encoding/hex" "math/big" "strings" "testing" ) type MaliciousInputs struct { SQLInjection []string XSSPayloads []string PathTraversal []string CommandInjection []string LDAPInjection []string NoSQLInjection []string CSRFPayloads []string XXE []string SSRF []string BufferOverflow []string FormatString []string Unicode []string Encoding []string } func GetMaliciousInputs() *MaliciousInputs { return &MaliciousInputs{ SQLInjection: []string{ "'; DROP TABLE users; --", "' OR '1'='1", "' UNION SELECT * FROM users --", "'; INSERT INTO users VALUES ('hacker', 'hacker@evil.com', 'password'); --", "' OR 1=1 --", "admin'--", "admin'/*", "' OR 'x'='x", "' AND id IS NULL; --", "'; EXEC xp_cmdshell('dir'); --", "' UNION SELECT password FROM users WHERE username='admin' --", "1'; DELETE FROM users; --", "' OR 'a'='a", "'; UPDATE users SET password='hacked' WHERE username='admin'; --", "' OR EXISTS(SELECT * FROM users WHERE username='admin') --", }, XSSPayloads: []string{ "", "", "", "javascript:alert('XSS')", "", "", "", "