Automatic SQL injection and database takeover tool
Go to file
Tomas Zellerin a6c26fe792 Python 3 binary-character fixes for two urllib requests (#4077)
* Fix python3 binary - character mismatch in api.py

Convert between text and binary data in api.py call to urllib.request
and response from it.

In python3 sqlmapapi -c it fixes, at least
- not nice output from log/list commands
- any command that POSTs data (including new) crashing sqlmapapi

* Fix python3 binary - character mismatch in search.py

Before:
python3 sqlmap.py -g <long random string>
(...)
[18:35:17] [INFO] using search result page #1
no usable links found. What do you want to do?
[1] (re)try with DuckDuckGo (default)
[2] (re)try with Bing
[3] quit
> 1
[18:35:21] [CRITICAL] unable to connect

After:
python3 sqlmap.py -g asfafw2fwesvzsdvaw
(...)
[18:37:30] [INFO] using search result page #1
no usable links found. What do you want to do?
[1] (re)try with DuckDuckGo (default)
[2] (re)try with Bing
[3] quit
> 1
[18:37:34] [INFO] found 26 results for your search dork expression, 16 of them are testable targets
[18:37:34] [INFO] found a total of 16 targets
URL 1:
GET https:...
do you want to test this URL? [Y/n/q]
2020-01-15 22:36:49 +01:00
.github Update issue templates 2019-05-15 15:41:42 +02:00
data Minor update 2020-01-07 11:48:02 +01:00
doc Minor update 2020-01-05 22:51:31 +01:00
extra Some testing stuff 2020-01-07 23:49:45 +01:00
lib Python 3 binary-character fixes for two urllib requests (#4077) 2020-01-15 22:36:49 +01:00
plugins Removing some dead code (vulture) 2020-01-10 11:44:24 +01:00
tamper Copyright year bump 2020-01-01 13:25:15 +01:00
thirdparty Fixes #4063 2020-01-07 09:31:54 +01:00
.gitattributes Minor update 2019-03-19 15:23:11 +01:00
.gitignore Trivial update 2019-04-18 14:48:50 +02:00
.pylintrc Further pleasing pylint gods 2019-06-01 13:42:57 +02:00
.travis.yml Trying something out 2019-11-13 14:19:18 +01:00
COMMITMENT Add GPL Cooperation Commitment (#3445) 2019-01-24 11:07:13 +01:00
LICENSE Copyright year bump 2020-01-01 13:25:15 +01:00
README.md Minor update 2019-11-15 09:41:51 +01:00
sqlmap.conf Minor update 2020-01-07 11:48:02 +01:00
sqlmap.py Some testing stuff 2020-01-07 23:49:45 +01:00
sqlmapapi.py Copyright year bump 2020-01-01 13:25:15 +01:00

sqlmap

Build Status Python 2.6|2.7|3.x License PyPI version GitHub closed issues Twitter

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections.

The sqlmap project is currently searching for sponsor(s).

Screenshots

Screenshot

You can visit the collection of screenshots demonstrating some of the features on the wiki.

Installation

You can download the latest tarball by clicking here or latest zipball by clicking here.

Preferably, you can download sqlmap by cloning the Git repository:

git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev

sqlmap works out of the box with Python version 2.6, 2.7 and 3.x on any platform.

Usage

To get a list of basic options and switches use:

python sqlmap.py -h

To get a list of all options and switches use:

python sqlmap.py -hh

You can find a sample run here. To get an overview of sqlmap capabilities, a list of supported features, and a description of all options and switches, along with examples, you are advised to consult the user's manual.

Translations