Many applications rely on databases to store data. Some of these data may be very sensitive in nature, e.g. password hashes, email addresses, financial information, tax information, etc. Attackers often exploit security vulnerabilities to steal sensitive information...