Automatic SQL injection and database takeover tool
Go to file
2011-01-02 15:57:52 +00:00
doc fix for a bug reported by m4l1c3 (AttributeError: '_MainThread' object has no attribute 'ident') 2010-12-20 23:47:53 +00:00
extra removed some problematic user agents (google won't work with them) and added page rank next to tested item in multi target mode 2011-01-02 08:43:38 +00:00
lib bug fix for proper --parse-errors on .aspx pages 2011-01-02 13:00:04 +00:00
plugins bug fix (TypeError: object of type 'NoneType' has no len()) 2011-01-02 12:26:31 +00:00
shell removed a trailer blank like (cosmetics) 2010-11-24 14:25:16 +00:00
tamper further refactoring (all enumerations are now put into enums.py) 2010-11-08 09:20:02 +00:00
txt removing too old user-agents (some sites just reject those because of possible rendering issues) 2011-01-02 15:57:52 +00:00
udf Removed duplicate UDFs files 2010-07-20 10:44:27 +00:00
xml one more MSSQL/ASPX error banner regex 2011-01-02 15:36:57 +00:00
sqlmap.conf Got rid of unreliable 'ORDER BY' technique to detect UNION query SQL injection, consequently switch --union-tech has gone now. 2010-11-29 17:18:38 +00:00
sqlmap.py important update regarding restoring of potentially changed switch values in multi-target mode and/or missing switch values in resume mode 2011-01-02 10:37:32 +00:00