Automatic SQL injection and database takeover tool
Go to file
2011-01-02 07:37:47 +00:00
doc fix for a bug reported by m4l1c3 (AttributeError: '_MainThread' object has no attribute 'ident') 2010-12-20 23:47:53 +00:00
extra removed some blank trailing spaces (with extra/shutils/blanks.sh) 2010-12-21 10:31:56 +00:00
lib added support for displaying HTTP error codes (particularly interesting ones are 403 and 406 which screw up data retrieval and DBMS fingerprinting badly) 2011-01-02 07:37:47 +00:00
plugins update (http://dev.mysql.com/doc/refman/5.0/en/server-system-variables.html) 2011-01-01 19:38:51 +00:00
shell removed a trailer blank like (cosmetics) 2010-11-24 14:25:16 +00:00
tamper further refactoring (all enumerations are now put into enums.py) 2010-11-08 09:20:02 +00:00
txt minor update 2010-12-26 11:24:41 +00:00
udf Removed duplicate UDFs files 2010-07-20 10:44:27 +00:00
xml minor bug fix 2011-01-01 23:07:50 +00:00
sqlmap.conf Got rid of unreliable 'ORDER BY' technique to detect UNION query SQL injection, consequently switch --union-tech has gone now. 2010-11-29 17:18:38 +00:00
sqlmap.py added support for displaying HTTP error codes (particularly interesting ones are 403 and 406 which screw up data retrieval and DBMS fingerprinting badly) 2011-01-02 07:37:47 +00:00