Automatic SQL injection and database takeover tool
Go to file
2010-11-20 13:22:59 +00:00
doc Added new switch --union-char to be able to provide the character used in union-test and exploit (default is still NULL, but can be any) 2010-11-19 14:56:20 +00:00
extra foundations for dictionary attack support combined with the sqlmap's password/hash retrieval functionality (--password switch) 2010-11-20 13:14:13 +00:00
lib sorry, even more proper naming should be like this (passwd is a standard naming for this kind of function(s)) 2010-11-20 13:22:59 +00:00
plugins Proper english (--postfix is now --suffix) and --string/--regexp does not necessarily need to match into the original response body, it might well be in the injected True condition only! 2010-11-17 22:00:09 +00:00
shell minor fix 2010-11-15 09:48:58 +00:00
tamper further refactoring (all enumerations are now put into enums.py) 2010-11-08 09:20:02 +00:00
txt renaming of dicts.zip to wordlists.zip (more proper name) 2010-11-20 13:17:13 +00:00
udf Removed duplicate UDFs files 2010-07-20 10:44:27 +00:00
xml we had a bug (nooooooooo!!!! :)) 2010-11-19 10:36:47 +00:00
sqlmap.conf Improved --union-cols to accept a range to test for union SQL injection. By default it is 1-20. 2010-11-19 15:48:24 +00:00
sqlmap.py Minor code refactoring 2010-10-20 22:09:03 +00:00