mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 01:26:42 +03:00
Added another tamper script
This commit is contained in:
parent
d9e499af9f
commit
4ac2611a56
31
tamper/apostrophenullencode.py
Normal file
31
tamper/apostrophenullencode.py
Normal file
|
@ -0,0 +1,31 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
"""
|
||||
$Id$
|
||||
|
||||
Copyright (c) 2006-2012 sqlmap developers (http://www.sqlmap.org/)
|
||||
See the file 'doc/COPYING' for copying permission
|
||||
"""
|
||||
|
||||
from lib.core.enums import PRIORITY
|
||||
|
||||
__priority__ = PRIORITY.LOWEST
|
||||
|
||||
def dependencies():
|
||||
pass
|
||||
|
||||
def tamper(payload):
|
||||
"""
|
||||
Replaces apostrophe character with its illegal double unicode counterpart
|
||||
|
||||
Example:
|
||||
* Input: AND '1'='1'
|
||||
* Output: AND %00%271%00%27=%00%271%00%27
|
||||
"""
|
||||
|
||||
retVal = payload
|
||||
|
||||
if payload:
|
||||
retVal = payload.replace('\'', '%00%27')
|
||||
|
||||
return retVal
|
Loading…
Reference in New Issue
Block a user