Automatic SQL injection and database takeover tool
Go to file
2011-05-23 19:59:07 +00:00
doc incorporating metasploit patch from oliver.kuckertz@mologie.de 2011-05-23 15:27:10 +00:00
extra changes in handling --tor (using SOCKS instead of HTTP for handling Tor - more standard way; doesn't require proxy bundle; fixes problems with default proxy ports on Win/Linux) 2011-05-21 11:46:57 +00:00
lib this was causing that --suffix trouble 2011-05-23 19:59:07 +00:00
plugins minor update 2011-05-23 19:16:29 +00:00
procs minor cosmetics 2011-04-19 09:55:35 +00:00
shell removed a trailer blank like (cosmetics) 2010-11-24 14:25:16 +00:00
tamper update of copyright string (until year) 2011-04-15 12:33:18 +00:00
txt update of copyright string (until year) 2011-04-15 12:33:18 +00:00
udf MySQL Windows 32-bit DLL recompiled (Visual C++ 2005) and stripped (UPX) - this is the smallest we can get 2011-04-11 22:04:41 +00:00
xml added MySQL >=4.1 <=5.0 error based WHERE/HAVING payload 2011-05-23 06:24:45 +00:00
sqlmap.conf added --charset option to force charset encoding of the retrieved data (e.g. when the backend collation is different than the current web page charset) as requested by devon.mitchell1988@y​ahoo.com 2011-05-17 22:55:22 +00:00
sqlmap.py most elegant way i could think of to deal with "collation incompatibilities" issue on some MySQL/UNION cases (affected about 5% of all targets tested) 2011-05-22 19:14:36 +00:00