Automatic SQL injection and database takeover tool
Go to file
2013-02-14 11:32:17 +00:00
doc updated doc 2013-02-13 16:30:11 +00:00
extra reverted a previous commit as not all distributions create a link file /usr/bin/python2 to the Python interpreter 2013-02-14 11:32:17 +00:00
lib reverted a previous commit as not all distributions create a link file /usr/bin/python2 to the Python interpreter 2013-02-14 11:32:17 +00:00
plugins reverted a previous commit as not all distributions create a link file /usr/bin/python2 to the Python interpreter 2013-02-14 11:32:17 +00:00
procs Fix for an Issue #333 2013-01-11 14:09:30 +01:00
shell making PHP stager smaller by 100 chars 2012-06-21 10:46:45 +00:00
tamper reverted a previous commit as not all distributions create a link file /usr/bin/python2 to the Python interpreter 2013-02-14 11:32:17 +00:00
thirdparty reverted a previous commit as not all distributions create a link file /usr/bin/python2 to the Python interpreter 2013-02-14 11:32:17 +00:00
txt updated copyright 2013-01-18 14:07:51 +00:00
udf cleanup to README files 2012-07-17 00:32:32 +01:00
xml Fix for an Issue #273 (must for MsSQL 2000; works on MsSQL > 2000) 2013-02-14 10:08:29 +01:00
.gitattributes Minor update 2012-12-27 15:14:40 +01:00
.gitignore Trivial update 2012-12-26 17:15:59 +01:00
CONTRIBUTING.md Create CONTRIBUTING.md 2012-12-06 02:53:03 -08:00
README.md Update README.md 2012-08-23 20:08:57 +03:00
sqlmap.conf Unescaping is renamed to escaping 2013-01-18 15:40:37 +01:00
sqlmap.py reverted a previous commit as not all distributions create a link file /usr/bin/python2 to the Python interpreter 2013-02-14 11:32:17 +00:00
sqlmapapi.py reverted a previous commit as not all distributions create a link file /usr/bin/python2 to the Python interpreter 2013-02-14 11:32:17 +00:00

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

Links