Automatic SQL injection and database takeover tool
Go to file
2010-12-23 09:53:13 +00:00
doc fix for a bug reported by m4l1c3 (AttributeError: '_MainThread' object has no attribute 'ident') 2010-12-20 23:47:53 +00:00
extra removed some blank trailing spaces (with extra/shutils/blanks.sh) 2010-12-21 10:31:56 +00:00
lib lol. this was a pesky bug. heuristic wasn't working on one mssql test site and i couldn't find why. at end the problem was that when the HTTP code was raised (like 500) no parseResponse was called. 2010-12-22 19:12:46 +00:00
plugins bug fix (AttributeError: 'unicode' object has no attribute 'sort') 2010-12-22 18:55:50 +00:00
shell removed a trailer blank like (cosmetics) 2010-11-24 14:25:16 +00:00
tamper further refactoring (all enumerations are now put into enums.py) 2010-11-08 09:20:02 +00:00
txt minor update 2010-12-21 23:42:59 +00:00
udf Removed duplicate UDFs files 2010-07-20 10:44:27 +00:00
xml fix for a case: Microsoft OLE DB Provider for ODBC Drivers error '80040e14' [MySQL][ODBC 3.51 Driver][mysqld-5.1.31-community] - it was wrongly error message recognized as MS SQL Server 2010-12-23 09:53:13 +00:00
sqlmap.conf Got rid of unreliable 'ORDER BY' technique to detect UNION query SQL injection, consequently switch --union-tech has gone now. 2010-11-29 17:18:38 +00:00
sqlmap.py Minor code refactoring 2010-10-20 22:09:03 +00:00