package testutils
import (
"crypto/rand"
"crypto/sha256"
"encoding/hex"
"math/big"
"strings"
"testing"
)
type MaliciousInputs struct {
SQLInjection []string
XSSPayloads []string
PathTraversal []string
CommandInjection []string
LDAPInjection []string
NoSQLInjection []string
CSRFPayloads []string
XXE []string
SSRF []string
BufferOverflow []string
FormatString []string
Unicode []string
Encoding []string
}
func GetMaliciousInputs() *MaliciousInputs {
return &MaliciousInputs{
SQLInjection: []string{
"'; DROP TABLE users; --",
"' OR '1'='1",
"' UNION SELECT * FROM users --",
"'; INSERT INTO users VALUES ('hacker', 'hacker@evil.com', 'password'); --",
"' OR 1=1 --",
"admin'--",
"admin'/*",
"' OR 'x'='x",
"' AND id IS NULL; --",
"'; EXEC xp_cmdshell('dir'); --",
"' UNION SELECT password FROM users WHERE username='admin' --",
"1'; DELETE FROM users; --",
"' OR 'a'='a",
"'; UPDATE users SET password='hacked' WHERE username='admin'; --",
"' OR EXISTS(SELECT * FROM users WHERE username='admin') --",
},
XSSPayloads: []string{
"",
"
",
"