mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-10-31 07:57:47 +03:00 
			
		
		
		
	Added another tamper script
This commit is contained in:
		
							parent
							
								
									d9e499af9f
								
							
						
					
					
						commit
						4ac2611a56
					
				
							
								
								
									
										31
									
								
								tamper/apostrophenullencode.py
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										31
									
								
								tamper/apostrophenullencode.py
									
									
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,31 @@ | |||
| #!/usr/bin/env python | ||||
| 
 | ||||
| """ | ||||
| $Id$ | ||||
| 
 | ||||
| Copyright (c) 2006-2012 sqlmap developers (http://www.sqlmap.org/) | ||||
| See the file 'doc/COPYING' for copying permission | ||||
| """ | ||||
| 
 | ||||
| from lib.core.enums import PRIORITY | ||||
| 
 | ||||
| __priority__ = PRIORITY.LOWEST | ||||
| 
 | ||||
| def dependencies(): | ||||
|     pass | ||||
| 
 | ||||
| def tamper(payload): | ||||
|     """ | ||||
|     Replaces apostrophe character with its illegal double unicode counterpart | ||||
| 
 | ||||
|     Example: | ||||
|         * Input: AND '1'='1' | ||||
|         * Output: AND %00%271%00%27=%00%271%00%27 | ||||
|     """ | ||||
| 
 | ||||
|     retVal = payload | ||||
| 
 | ||||
|     if payload: | ||||
|         retVal = payload.replace('\'', '%00%27') | ||||
| 
 | ||||
|     return retVal | ||||
		Loading…
	
		Reference in New Issue
	
	Block a user