mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-25 02:53:46 +03:00
Automatic SQL injection and database takeover tool
databasedetectionexploitationpentestingpythonsql-injectionsqlmapstarred-repostarred-sqlmapproject-repotakeovervulnerability-scanner
e35f25b2cb
* It is stealthier as the shellcode itself does not touch the filesystem, it's an argument passed to shellcodeexec at runtime. * shellcodeexec is not (yet) recognized as malicious by any (Avast excluded) AV product. * shellcodeexec binary size is significantly smaller than a Metasploit payload stager (even when packed with UPX). * UPX now is not needed anymore, so sqlmap package is also way smaller and less likely to be detected itself as malicious by your AV software. shellcodeexec source code, compilation files and binaries are in extra/shellcodeexec/ folder now - copied over from https://github.com/inquisb/shellcodeexec. Minor code refactoring. |
||
---|---|---|
doc | ||
extra | ||
lib | ||
plugins | ||
procs | ||
shell | ||
tamper | ||
txt | ||
udf | ||
xml | ||
sqlmap.conf | ||
sqlmap.py |