sqlmap/tamper/base64encode.py

27 lines
545 B
Python
Raw Normal View History

#!/usr/bin/env python
2011-11-21 16:47:23 +04:00
"""
2018-01-02 02:48:10 +03:00
Copyright (c) 2006-2018 sqlmap developers (http://sqlmap.org/)
2017-10-11 15:50:46 +03:00
See the file 'LICENSE' for copying permission
2011-11-21 16:47:23 +04:00
"""
import base64
from lib.core.enums import PRIORITY
2013-09-21 14:24:49 +04:00
from lib.core.settings import UNICODE_ENCODING
2011-11-21 16:47:23 +04:00
2018-02-08 18:49:16 +03:00
__priority__ = PRIORITY.LOW
2011-11-21 16:47:23 +04:00
def dependencies():
pass
2012-12-03 17:27:01 +04:00
def tamper(payload, **kwargs):
2011-11-21 16:47:23 +04:00
"""
Base64 all characters in a given payload
>>> tamper("1' AND SLEEP(5)#")
'MScgQU5EIFNMRUVQKDUpIw=='
2011-11-21 16:47:23 +04:00
"""
2013-09-21 14:24:49 +04:00
return base64.b64encode(payload.encode(UNICODE_ENCODING)) if payload else payload