
This list can be used by penetration testers when
testing for SQL injection authentication bypass.A penetration tester can use it
manually or through burp in order to automate the process.The creator
of this list is Dr. Emin İslam TatlıIf (OWASP Board Member).If you have any
other suggestions...