Automatic SQL injection and database takeover tool
Go to file
2011-04-28 20:54:21 +00:00
doc as we don't use UPX anymore.. 2011-04-28 20:54:21 +00:00
extra Major recode of --os-pwn functionality. Now the Metasploit shellcode can not be run as a Metasploit generated payload stager anymore. Instead it can be run on the target system either via sys_bineval() (as it was before, anti-forensics mode, all the same) or via shellcodeexec executable. Advantages are that: 2011-04-24 23:01:21 +00:00
lib cosmeticados 2011-04-25 00:36:09 +00:00
plugins Major recode of --os-pwn functionality. Now the Metasploit shellcode can not be run as a Metasploit generated payload stager anymore. Instead it can be run on the target system either via sys_bineval() (as it was before, anti-forensics mode, all the same) or via shellcodeexec executable. Advantages are that: 2011-04-24 23:01:21 +00:00
procs minor cosmetics 2011-04-19 09:55:35 +00:00
shell removed a trailer blank like (cosmetics) 2010-11-24 14:25:16 +00:00
tamper update of copyright string (until year) 2011-04-15 12:33:18 +00:00
txt update of copyright string (until year) 2011-04-15 12:33:18 +00:00
udf MySQL Windows 32-bit DLL recompiled (Visual C++ 2005) and stripped (UPX) - this is the smallest we can get 2011-04-11 22:04:41 +00:00
xml paranoy 2011-04-21 23:41:25 +00:00
sqlmap.conf Refactoring to --technique 2011-04-07 10:00:47 +00:00
sqlmap.py update of copyright string (until year) 2011-04-15 12:33:18 +00:00