Hey,
you are presenting some solutions for the "low"-difficult level, did you ever had a try on medium or hard?
Lets consider the difficult "medium" while doing a SQL-Injection (GET/Search). It seems, that this software uses "addslashes()" together with "mysql_real_escape_string()". How would you start or prepare an attack?