You must have read my previous article on how authentication bypass works.
This is a list of other combinations you can try that work similarly by becoming part of the original query.
The list has been given by Dr. Emin İslam TatlıIf , a former board member of OWASP( Open Web Application Security Project).