Automatic SQL injection and database takeover tool
Go to file
Bernardo Damele 7e3b24afe6 Rewrite from scratch the detection engine. Now it performs checks defined in payload.xml. User can specify its own.
All (hopefully) functionalities should still be working.
Added two switches, --level and --risk to specify which injection tests and boundaries to use.
The main advantage now is that sqlmap is able to identify initially which injection types are present so for instance if boolean-based blind is not supported, but error-based is, sqlmap will keep going and work!
2010-11-28 18:10:54 +00:00
doc Added new switch --union-char to be able to provide the character used in union-test and exploit (default is still NULL, but can be any) 2010-11-19 14:56:20 +00:00
extra foundations for dictionary attack support combined with the sqlmap's password/hash retrieval functionality (--password switch) 2010-11-20 13:14:13 +00:00
lib Rewrite from scratch the detection engine. Now it performs checks defined in payload.xml. User can specify its own. 2010-11-28 18:10:54 +00:00
plugins Rewrite from scratch the detection engine. Now it performs checks defined in payload.xml. User can specify its own. 2010-11-28 18:10:54 +00:00
shell removed a trailer blank like (cosmetics) 2010-11-24 14:25:16 +00:00
tamper further refactoring (all enumerations are now put into enums.py) 2010-11-08 09:20:02 +00:00
txt more code refactoring 2010-11-23 14:50:47 +00:00
udf Removed duplicate UDFs files 2010-07-20 10:44:27 +00:00
xml Rewrite from scratch the detection engine. Now it performs checks defined in payload.xml. User can specify its own. 2010-11-28 18:10:54 +00:00
sqlmap.conf Rewrite from scratch the detection engine. Now it performs checks defined in payload.xml. User can specify its own. 2010-11-28 18:10:54 +00:00
sqlmap.py Minor code refactoring 2010-10-20 22:09:03 +00:00