Update of supported DBMSes

This commit is contained in:
Miroslav Stampar 2020-01-31 21:33:31 +01:00
parent a6b3104600
commit 89f86e057c

View File

@ -62,7 +62,7 @@ Warning: SQLite3::exec(): near "": syntax error in index.php on line 19
<a name="features"><h1>Features</h1></a> <a name="features"><h1>Features</h1></a>
<ul> <ul>
<li>Full support for <strong>MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB, Informix, MariaDB, MemSQL, TiDB, CockroachDB, HSQLDB, H2, MonetDB, Apache Derby, Vertica, Mckoi and Presto</strong> database management systems.</li> <li>Full support for <strong>MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB, Informix, MariaDB, MemSQL, TiDB, CockroachDB, HSQLDB, H2, MonetDB, Apache Derby, Amazon Redshift, Vertica, Mckoi, Presto, Altibase and MimerSQL</strong> database management systems.</li>
<li>Full support for six SQL injection techniques: <strong>boolean-based blind, time-based blind, error-based, UNION query-based, stacked queries and out-of-band</strong>.</li> <li>Full support for six SQL injection techniques: <strong>boolean-based blind, time-based blind, error-based, UNION query-based, stacked queries and out-of-band</strong>.</li>
<li>Support to <strong>directly connect to the database</strong> without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name.</li> <li>Support to <strong>directly connect to the database</strong> without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name.</li>
<li>Support to enumerate <strong>users, password hashes, privileges, roles, databases, tables and columns</strong>.</li> <li>Support to enumerate <strong>users, password hashes, privileges, roles, databases, tables and columns</strong>.</li>