Automatic SQL injection and database takeover tool
Go to file
2013-04-03 14:17:13 +02:00
doc Update of doc/THANKS 2013-03-20 10:34:48 +01:00
extra Minor language fix 2013-03-26 14:11:17 +01:00
lib Minor cosmetics 2013-04-02 17:34:56 +02:00
plugins Removal of unused imports 2013-03-20 10:44:15 +01:00
procs Fix for an Issue #333 2013-01-11 14:09:30 +01:00
shell making PHP stager smaller by 100 chars 2012-06-21 10:46:45 +00:00
tamper Another update for an Issue #352 and couple of fixes 2013-03-13 21:57:09 +01:00
thirdparty reverted a previous commit as not all distributions create a link file /usr/bin/python2 to the Python interpreter 2013-02-14 11:32:17 +00:00
txt Revert of previous commit (substrings are checked too) 2013-03-05 18:26:47 +01:00
udf cleanup to README files 2012-07-17 00:32:32 +01:00
waf Update for consistency (all other enums are using _ in between words) 2013-03-20 11:10:24 +01:00
xml Heavy queries should not have --time-sec set to some small value in live tests as their responses are machine dependent (on fast machines --time-sec=2 will result in fast responses making sqlmap life harder) 2013-04-03 14:17:13 +02:00
.gitattributes Minor update 2012-12-27 15:14:40 +01:00
.gitignore Trivial update 2012-12-26 17:15:59 +01:00
CONTRIBUTING.md Create CONTRIBUTING.md 2012-12-06 02:53:03 -08:00
README.md Update README.md 2012-08-23 20:08:57 +03:00
sqlmap.conf Minor cosmetics 2013-04-02 17:34:56 +02:00
sqlmap.py reverted a previous commit as not all distributions create a link file /usr/bin/python2 to the Python interpreter 2013-02-14 11:32:17 +00:00
sqlmapapi.py reverted a previous commit as not all distributions create a link file /usr/bin/python2 to the Python interpreter 2013-02-14 11:32:17 +00:00

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

Links