We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent fd3e011 commit 8eba80aCopy full SHA for 8eba80a
src/malicious-load-generator/locustfile.py
@@ -176,7 +176,7 @@ def get_sql_golang(self):
176
time.sleep(1)
177
178
@task()
179
- def get_sql_nodejs(self):
+ def post_sql_login_injection_nodejs(self):
180
parameters = {'name': random.choice(SQL_CMDS_LOGIN_USERNAME), 'password': 'user'}
181
182
# post with the malicious SQL command
0 commit comments