Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
BEGIN TRANSACTION;
CREATE TABLE page_views (
id INTEGER PRIMARY KEY,
user INTEGER,
page TEXT,
arguments TEXT,
posts TEXT
);
CREATE TABLE user (
id INTEGER PRIMARY KEY,
username TEXT NOT NULL,
email TEXT NOT NULL,
access_type INTEGER DEFAULT 0,
password TEXT NOT NULL
);
INSERT INTO user VALUES(1,'Davee','admin@gmail.com',1,'$2b$12$JUc4k3BnTQolh0m/gvPWSO9Ez9POhns.yezKS50RMUzMvvwgqgt9O');
CREATE TABLE product (
id INTEGER PRIMARY KEY,
name TEXT NOT NULL,
description TEXT NOT NULL,
price REAL,
image TEXT
);
INSERT INTO product VALUES(1,'Linux Basics for Hackers , Getting Started with Networking, Scripting, and Security in Kali','Many aspiring hackers are unfamiliar with Linux, having learned computer basics in a Windows or Mac environment. This can pose the single most important obstacle to mastering the skills to becoming a better hacker; while hacking can be done with Windows or OS X, nearly all hacking tools are developed specifically for Linux. Linux Basics for Hackers aims to provide you with a foundation of Linux skills that every hacker needs. As you progress, you''ll have access to numerous real-world examples and hands-on exercises to apply your new knowledge and bring yourself up to speed.',14.990000000000000213,'LinuxBasics.jpg');
INSERT INTO product VALUES(2,'The Web Application Hacker′s Handbook: Finding and Exploiting Security Flaws','Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You''ll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side.',35.0,'WebAppHackers.jpg');
INSERT INTO product VALUES(3,'Gray Hat Hacking: The Ethical Hacker''s Handbook, Fifth Edition','Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.',28.989999999999998436,'GrayHat.jpg');
CREATE TABLE review (
id INTEGER PRIMARY KEY,
userID INTEGER NOT NULL,
productID INTEGER NOT NULL,
stars INTEGER,
review TEXT,
FOREIGN KEY (userID)
REFERENCES user (id),
FOREIGN KEY (productID)
REFERENCES product (id)
);
CREATE TABLE purchase (
id INTEGER PRIMARY KEY,
userID INTEGER NOT NULL,
productID INTEGER NOT NULL,
date DATE
);
COMMIT;