mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-06-30 01:43:22 +03:00
added highlighting to code snippet
This commit is contained in:
parent
c05ee0eeb2
commit
66248cdf4f
|
@ -838,10 +838,12 @@ To take advantage of this switch, provide sqlmap with a comma-separated list of
|
||||||
|
|
||||||
The format of a valid tamper script is as follows:
|
The format of a valid tamper script is as follows:
|
||||||
|
|
||||||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ {.python}
|
||||||
# Needed imports
|
# Needed imports
|
||||||
from lib.core.enums import PRIORITY
|
from lib.core.enums import PRIORITY
|
||||||
|
|
||||||
# Define which is the order of application of tamper scripts against the payload
|
# Define which is the order of application of tamper scripts against
|
||||||
|
# the payload
|
||||||
__priority__ = PRIORITY.NORMAL
|
__priority__ = PRIORITY.NORMAL
|
||||||
|
|
||||||
def tamper(payload):
|
def tamper(payload):
|
||||||
|
@ -855,6 +857,7 @@ The format of a valid tamper script is as follows:
|
||||||
|
|
||||||
# return the tampered payload
|
# return the tampered payload
|
||||||
return retVal
|
return retVal
|
||||||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||||||
|
|
||||||
You can check valid and usable tamper scripts in the `tamper/` directory.
|
You can check valid and usable tamper scripts in the `tamper/` directory.
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user