Automatic SQL injection and database takeover tool
Go to file
2013-02-27 14:28:54 +01:00
doc Update for an doc/THANKS (Issue #290) 2013-02-21 14:51:04 +01:00
extra Minor fix 2013-02-22 17:34:53 +01:00
lib Refactoring WAF scripts 2013-02-26 15:54:50 +01:00
plugins removed leftover 2013-02-26 10:12:18 +00:00
procs Fix for an Issue #333 2013-01-11 14:09:30 +01:00
shell making PHP stager smaller by 100 chars 2012-06-21 10:46:45 +00:00
tamper Update for special cases 2013-02-19 10:12:47 +01:00
thirdparty reverted a previous commit as not all distributions create a link file /usr/bin/python2 to the Python interpreter 2013-02-14 11:32:17 +00:00
txt updated copyright 2013-01-18 14:07:51 +00:00
udf cleanup to README files 2012-07-17 00:32:32 +01:00
waf Minor update 2013-02-27 14:28:54 +01:00
xml Reverting last commit as there is bunch of similar 2013-02-20 17:35:36 +01:00
.gitattributes Minor update 2012-12-27 15:14:40 +01:00
.gitignore Trivial update 2012-12-26 17:15:59 +01:00
CONTRIBUTING.md Create CONTRIBUTING.md 2012-12-06 02:53:03 -08:00
README.md Update README.md 2012-08-23 20:08:57 +03:00
sqlmap.conf Unhidding switch '--identify-waf' (Issue #290) 2013-02-21 14:48:19 +01:00
sqlmap.py reverted a previous commit as not all distributions create a link file /usr/bin/python2 to the Python interpreter 2013-02-14 11:32:17 +00:00
sqlmapapi.py reverted a previous commit as not all distributions create a link file /usr/bin/python2 to the Python interpreter 2013-02-14 11:32:17 +00:00

sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

Links