Automatic SQL injection and database takeover tool
Go to file
2012-12-11 14:44:43 +01:00
doc minor update 2012-10-29 10:10:33 +01:00
extra Implementation for an Issue #292 2012-12-11 12:02:06 +01:00
lib Minor update for Issues #292 & #293 (only single alert per target) 2012-12-11 14:44:43 +01:00
plugins Fix for an Issue #294 2012-12-11 12:14:33 +01:00
procs Bug fix for --os-shell on MySQL (it was not working for a long time because of this) 2012-10-29 15:45:30 +01:00
shell making PHP stager smaller by 100 chars 2012-06-21 10:46:45 +00:00
tamper Removed unused imports and variables (pyflake-ing) 2012-12-06 11:15:05 +01:00
thirdparty Doing some more style updating (capitalization of exception classes; using _ is enough for private members - __ is used in Python specific methods) 2012-12-06 14:14:19 +01:00
txt Minor cleanup of standard wordlist (html entities, etc.) 2012-09-12 16:06:32 +02:00
udf cleanup to README files 2012-07-17 00:32:32 +01:00
xml Lowering --limit for inline query technique 2012-12-05 10:58:41 +01:00
_sqlmap.py Doing some more style updating (capitalization of exception classes; using _ is enough for private members - __ is used in Python specific methods) 2012-12-06 14:14:19 +01:00
.gitignore slightly updated gitignore 2012-07-11 16:54:53 +01:00
CONTRIBUTING.md Create CONTRIBUTING.md 2012-12-06 02:53:03 -08:00
README.md Update README.md 2012-08-23 20:08:57 +03:00
sqlmap.conf Implementation for an Issue #293 2012-12-11 12:48:58 +01:00
sqlmap.py Minor style update 2012-08-22 15:05:17 +02:00

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

Links