el-hacker.org Downloads
    Name                                       Last modified      Size
 Name                                       Last modified      Size  
![[Volver]](/icons/back.gif) Parent Directory                                                -
 Parent Directory                                                -   
![[Directorio]](/icons/folder2.png) 1. Why SQL Injection Matters/              2024-01-31 12:25    -
 1. Why SQL Injection Matters/              2024-01-31 12:25    -   
![[Directorio]](/icons/folder2.png) 2. Understanding SQL Queries/              2024-01-31 12:26    -
 2. Understanding SQL Queries/              2024-01-31 12:26    -   
![[Directorio]](/icons/folder2.png) 3. The mechanics of SQL Injection Attacks/ 2024-01-31 12:25    -
 3. The mechanics of SQL Injection Attacks/ 2024-01-31 12:25    -   
![[Directorio]](/icons/folder2.png) 4. Discovering Schema and Extracting Data/ 2024-01-31 12:25    -
 4. Discovering Schema and Extracting Data/ 2024-01-31 12:25    -   
![[Directorio]](/icons/folder2.png) 5. Blind SQL Injection/                    2024-01-31 12:24    -
 5. Blind SQL Injection/                    2024-01-31 12:24    -   
![[Directorio]](/icons/folder2.png) 6. Advanced SQL Injection Concepts/        2024-01-31 12:24    -
 6. Advanced SQL Injection Concepts/        2024-01-31 12:24    -   
![[Directorio]](/icons/folder2.png) 7. Defending against attacks/              2024-01-31 12:24    -
 7. Defending against attacks/              2024-01-31 12:24    -   
![[Directorio]](/icons/folder2.png) 8. Evasion Techniques/                     2024-01-31 12:23    -
 8. Evasion Techniques/                     2024-01-31 12:23    -   
![[Directorio]](/icons/folder2.png) 9. Automating Attacks/                     2024-01-31 12:23    -
 9. Automating Attacks/                     2024-01-31 12:23    -