Skip to content
No description, website, or topics provided.
Branch: master
Clone or download
Latest commit 36e1c19 Aug 4, 2019
Type Name Latest commit message Commit time
Failed to load latest commit information. Initial Upload Aug 4, 2019 Initial Upload Aug 4, 2019


SQLite is one of the most deployed software in the world. However, from a security perspective, it has only been examined through the lens of WebSQL and browser exploitation. We believe that this is just the tip of the iceberg. In our long term research, documented, we experimented with the exploitation of memory corruption issues within SQLite without relying on any environment other than the SQL language.

Query Oriented Programming

QOP is our approach in implementing common pwning primitives using nothing but SQL queries. We want to share with the community in the hope of encouraging researchers to pursue the endless possibilities of database engines exploitation.


  • The code is meant to be used for educational purposes only
  • We are not encouraging any illegal activtiy
  • The code is provided “as is” without any support
You can’t perform that action at this time.