mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 01:26:42 +03:00
Trivial cosmetics (breaking help into two lines)
This commit is contained in:
parent
98ac1cf9c1
commit
40e4422bbd
|
@ -18,7 +18,7 @@ from lib.core.enums import OS
|
||||||
from thirdparty.six import unichr as _unichr
|
from thirdparty.six import unichr as _unichr
|
||||||
|
|
||||||
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
|
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
|
||||||
VERSION = "1.5.3.11"
|
VERSION = "1.5.3.12"
|
||||||
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
|
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
|
||||||
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
|
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
|
||||||
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)
|
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)
|
||||||
|
|
|
@ -704,7 +704,7 @@ def cmdLineParser(argv=None):
|
||||||
help="Regexp for filtering targets")
|
help="Regexp for filtering targets")
|
||||||
|
|
||||||
general.add_argument("--skip-heuristics", dest="skipHeuristics", action="store_true",
|
general.add_argument("--skip-heuristics", dest="skipHeuristics", action="store_true",
|
||||||
help="Skip heuristic detection of SQLi/XSS/FI vulnerabilities")
|
help="Skip heuristic detection of vulnerabilities")
|
||||||
|
|
||||||
general.add_argument("--skip-waf", dest="skipWaf", action="store_true",
|
general.add_argument("--skip-waf", dest="skipWaf", action="store_true",
|
||||||
help="Skip heuristic detection of WAF/IPS protection")
|
help="Skip heuristic detection of WAF/IPS protection")
|
||||||
|
@ -731,7 +731,7 @@ def cmdLineParser(argv=None):
|
||||||
help="Run host OS command(s) when SQL injection is found")
|
help="Run host OS command(s) when SQL injection is found")
|
||||||
|
|
||||||
miscellaneous.add_argument("--beep", dest="beep", action="store_true",
|
miscellaneous.add_argument("--beep", dest="beep", action="store_true",
|
||||||
help="Beep on question and/or when SQLi/XSS/FI is found")
|
help="Beep on question and/or when vulnerability is found")
|
||||||
|
|
||||||
miscellaneous.add_argument("--dependencies", dest="dependencies", action="store_true",
|
miscellaneous.add_argument("--dependencies", dest="dependencies", action="store_true",
|
||||||
help="Check for missing (optional) sqlmap dependencies")
|
help="Check for missing (optional) sqlmap dependencies")
|
||||||
|
|
Loading…
Reference in New Issue
Block a user