mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-11-04 01:47:37 +03:00 
			
		
		
		
	Updated History (markdown)
							parent
							
								
									64b0421fe7
								
							
						
					
					
						commit
						e826888248
					
				| 
						 | 
				
			
			@ -7,6 +7,7 @@
 | 
			
		|||
 | 
			
		||||
## 2019
 | 
			
		||||
 | 
			
		||||
* **May 8**, support for Python 3 is [done](https://github.com/sqlmapproject/sqlmap/issues/93#issuecomment-490458365)
 | 
			
		||||
* **Jan 5**, stable version [1.3](https://github.com/sqlmapproject/sqlmap/releases/tag/1.3) released ([changeset](https://github.com/sqlmapproject/sqlmap/compare/1.2...1.3)).
 | 
			
		||||
 | 
			
		||||
## 2018
 | 
			
		||||
| 
						 | 
				
			
			@ -42,7 +43,7 @@
 | 
			
		|||
 | 
			
		||||
## 2011
 | 
			
		||||
 | 
			
		||||
* **December**, Throughout the year dozen of new features have been developed and hundreds of bugs have been fixed.
 | 
			
		||||
* **December**, throughout the year dozen of new features have been developed and hundreds of bugs have been fixed.
 | 
			
		||||
* **September 23**, Miroslav [presents](http://fsec.foi.hr/index.php/Miroslav_Stampar_-_It_all_starts_with_the_%27_-_SQL_injection_from_attackers_point_of_view) **It all starts with the ' (SQL injection from attacker's point of view)** ([slides](http://www.slideshare.net/stamparm/f-sec-2011miroslavstamparitallstartswiththesinglequote-9311238)) talking about methods attackers use in SQL injection attacks at FSec - FOI Security Symposium in Varazdin, Croatia.
 | 
			
		||||
* **June 23**, Miroslav [presents](https://ep2012.europython.eu/conference/talks/sqlmap-security-developing-in-python) **sqlmap - security development in Python** ([slides](http://www.slideshare.net/stamparm/euro-python-2011miroslavstamparsqlmapsecuritydevelopmentinpython)) talking about sqlmap internals at EuroPython 2011 in Firenze, Italy.
 | 
			
		||||
* **April 10**, [Bernardo and Miroslav](http://www.sqlmap.org/#developers) release sqlmap **0.9** featuring a totally rewritten and powerful SQL injection detection engine, the possibility to connect directly to a database server, support for time-based blind SQL injection and error-based SQL injection, support for four new database management systems and much more.
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue
	
	Block a user