Automatic SQL injection and database takeover tool
Go to file
Bernardo Damele 47f2d22181 Minor bug fix
2010-12-01 17:18:31 +00:00
doc Added new switch --union-char to be able to provide the character used in union-test and exploit (default is still NULL, but can be any) 2010-11-19 14:56:20 +00:00
extra foundations for dictionary attack support combined with the sqlmap's password/hash retrieval functionality (--password switch) 2010-11-20 13:14:13 +00:00
lib Minor bug fix 2010-12-01 17:18:31 +00:00
plugins Now, if the back-end dbms type has been identified by the detection engine, skips the fingerprint phase. 2010-11-30 22:40:25 +00:00
shell removed a trailer blank like (cosmetics) 2010-11-24 14:25:16 +00:00
tamper further refactoring (all enumerations are now put into enums.py) 2010-11-08 09:20:02 +00:00
txt more code refactoring 2010-11-23 14:50:47 +00:00
udf Removed duplicate UDFs files 2010-07-20 10:44:27 +00:00
xml Added tag <epayload> to the payloads.xml's <test> tag to define which payload to use when exploiting the test type. 2010-12-01 17:09:52 +00:00
sqlmap.conf Got rid of unreliable 'ORDER BY' technique to detect UNION query SQL injection, consequently switch --union-tech has gone now. 2010-11-29 17:18:38 +00:00
sqlmap.py Minor code refactoring 2010-10-20 22:09:03 +00:00