commands.sh

sqlmap

all

Detect and exploit SQL injection flaws.

More info →

Options (1)

-u, --urlboolean

Run sqlmap against a single target URL

Example: python sqlmap.py {{[-u|--url]}} "{{http://www.example.com/vuln.php?id=1}}"

Examples (5)

Run sqlmap against a single target URL

python sqlmap.py [-u|--url] "http://www.example.com/vuln.php?id=1"

Send data in a POST request (`--data` implies POST request)

python sqlmap.py [-u|--url] "http://www.example.com/vuln.php" --data="id=1"

Change the parameter delimiter (& is the default)

python sqlmap.py [-u|--url] "http://www.example.com/vuln.php" --data="query=foobar;id=1" --param-del=";"

Select a random `User-Agent` from `./txt/user-agents.txt` and use it

python sqlmap.py [-u|--url] "http://www.example.com/vuln.php" --random-agent

Provide user credentials for HTTP protocol authentication

python sqlmap.py [-u|--url] "http://www.example.com/vuln.php" --auth-type Basic --auth-cred "testuser:testpass"
made by @shridhargupta | data from tldr-pages