Skip to content

Commit fa9dc20

Browse files
committed
Minor update
1 parent 2592596 commit fa9dc20

12 files changed

+22
-22
lines changed

data/txt/sha256sums.txt

+11-11
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ c6a182f6b7d3b0ad6f0888ea2a4de4148f0770549038d7de8bc3267b4c6635f7 lib/core/readl
188188
63ae69713c6ea9abfa10e71dfab8f2dcf42432177a38d2c1e98785bf1468674c lib/core/replication.py
189189
5bad5bc7115051cef7b84efa73fbafbf5e1db46eef32a445056b56cda750b66f lib/core/revision.py
190190
0dcb52c9c76a4b0acf2e9038f7d8f08c14543cef3cf7032831c6c0a99376ad24 lib/core/session.py
191-
6bb2a76f94ecadb3f97a33901856a20c8d90d7b8b2866a264975c0501192ca72 lib/core/settings.py
191+
167941c1f7c279d31a377a80915de0cae31f06ba39bf802571a9980bb5ffbfff lib/core/settings.py
192192
a1e4f2860bffc73bbf2e5db293fa49dcb600ea35f950cda43dc953b3160ab3db lib/core/shell.py
193193
841716e87b90a3b598515910841f7cf8d33bb87c24a27fba1a80e36a831cbcd7 lib/core/subprocessng.py
194194
9731092f195e346716929323ea3c93247b23b9b92b0f32d3fd0acc3adf9876cc lib/core/target.py
@@ -478,15 +478,15 @@ b3d9d0644197ecb864e899c04ee9c7cd63891ecf2a0d3c333aad563eef735294 plugins/generi
478478
168309215af7dd5b0b71070e1770e72f1cbb29a3d8025143fb8aa0b88cd56b62 sqlmapapi.yaml
479479
6da15963699aa8916118f92c8838013bc02c84e4d7b9f33d971324c2ff348728 sqlmap.conf
480480
3795c6d03bc341a0e3aef3d7990ea8c272d91a4c307e1498e850594375af39f7 sqlmap.py
481-
d6788235cd599e05cb65e9c3279a03b1cf769d4aa15c78d226a1d2cf6aa14e86 tamper/0eunion.py
482-
35ad42cc9fbe66f025d9f6d0b1284a9f00213510e3c39e60a2d8f3e8b6a77e7b tamper/apostrophemask.py
483-
71bc240d0153fccb9caa828f05eca4e9d51c2e5510dee9fb8533b70226d29207 tamper/apostrophenullencode.py
484-
847b5dc53e195f30abaa6e60b9bc9f39e15df7e6c2a99b31a435b69a345c0937 tamper/appendnullbyte.py
485-
510b050400bf8cf3ed30d29635083dd69692ec0ca20fe9cb9958feb4f89e34fe tamper/base64encode.py
486-
c41f1f5fa2fa73b130f9194e89a04b512fe21784cf1a94e3a61680995999b1dd tamper/between.py
487-
576aa77cacbe18695038eeab851be217347ed28d1c0505a098e93fcb3db3575b tamper/binary.py
488-
805239f02e8f1bbc3374cb02aec3aa6ae37b72716344f201094c9f39ff35e655 tamper/bluecoat.py
489-
5e52fb35fbd46cd5293c03491913b655eb47ddb7e99c2830e454945eee693a22 tamper/chardoubleencode.py
481+
9d408612a6780f7f50a7f7887f923ff3f40be5bfa09a951c6dc273ded05b56c0 tamper/0eunion.py
482+
c1c2eaa7df016cc7786ccee0ae4f4f363b1dce139c61fb3e658937cb0d18fc54 tamper/apostrophemask.py
483+
19023093ab22aec3bce9523f28e8111e8f6125973e6d9c82adb60da056bdf617 tamper/apostrophenullencode.py
484+
ffb81905dfbfa346f949aed54755944403bfbc0cc015cd196e412d7c516c5111 tamper/appendnullbyte.py
485+
50c270f6073a2dab08a5d64a91db1d1b372a206abd85ad54a630e1067ad614cf tamper/base64encode.py
486+
874aea492eed81c646488cd184a2c07b0fba2be247208227c91de9b223b016ee tamper/between.py
487+
386ede29943456818e22ec9d1555693c9d676c9330bc527dbb9b3f52c9b3cbb1 tamper/binary.py
488+
63a3fc494ff07b9f0e37025ff932b386aaeafd24a65da7f530f562ed78083c51 tamper/bluecoat.py
489+
4635c3b863e624169347d37834021402d95b4240bd138bec2ffc9d4f28d23422 tamper/chardoubleencode.py
490490
fa25e5a74c6cf0787b4f72321294095a3b7690f53423f058187ad08b458ef1fe tamper/charencode.py
491491
1c87fc49792df6091b7eb880108142b42a0a3810cc0cd2316a858ccdbf1c5ce4 tamper/charunicodeencode.py
492492
00d51073f9e40d8dfa5fcb04eafda359bd0ecb91e358b3910f3ec43c1a381111 tamper/charunicodeescape.py
@@ -523,7 +523,7 @@ a1e7d8907e7b4b25b1a418e8d5221e909096f719dcb611d15b5e91c83454ccdc tamper/overlon
523523
704551003e62d4fc1949855931d6cebd57cc5cdbf2221dbd43e51cbdad6f130d tamper/plus2concat.py
524524
b9d1e3ee657236b13ad5ecaf2adfa089e24a0e67738253eedb533a68f277a6e3 tamper/plus2fnconcat.py
525525
fb4b7539284db076147a530df1dd072d5d35e32a71fd7bc8e312319d5f3aaa52 tamper/randomcase.py
526-
b27066b7ea4f69243d5a353327090a0630bbf7f512edf5e277cde2c10139b3dd tamper/randomcomments.py
526+
f40d9267b4e9b689412cd45eb7b61540420f977370c5f9deba272bdae09d2404 tamper/randomcomments.py
527527
35a8539ac8030d3fc176ea8231fe8983285fc576f7e0b50ccdf911a565f1f758 tamper/schemasplit.py
528528
a34524af6fe2f2bba642b3234fbf1aa8785761e7d82906005b5476b7cc724857 tamper/scientific.py
529529
65d22c54abfa61b73140020d48a86ec8eeb4c9e4e5e088d1462e4bce4a64f18b tamper/sleep2getlock.py

lib/core/settings.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
from thirdparty import six
2020

2121
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
22-
VERSION = "1.9.2.8"
22+
VERSION = "1.9.2.9"
2323
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
2424
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
2525
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)

tamper/0eunion.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def dependencies():
1616

1717
def tamper(payload, **kwargs):
1818
"""
19-
Replaces instances of <int> UNION with <int>e0UNION
19+
Replaces an integer followed by UNION with an integer followed by e0UNION
2020
2121
Requirement:
2222
* MySQL

tamper/apostrophemask.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def dependencies():
1414

1515
def tamper(payload, **kwargs):
1616
"""
17-
Replaces apostrophe character (') with its UTF-8 full width counterpart (e.g. ' -> %EF%BC%87)
17+
Replaces single quotes (') with their UTF-8 full-width equivalents (e.g. ' -> %EF%BC%87)
1818
1919
References:
2020
* http://www.utf8-chartable.de/unicode-utf8-table.pl?start=65280&number=128

tamper/apostrophenullencode.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def dependencies():
1414

1515
def tamper(payload, **kwargs):
1616
"""
17-
Replaces apostrophe character (') with its illegal double unicode counterpart (e.g. ' -> %00%27)
17+
Replaces single quotes (') with an illegal double Unicode encoding (e.g. ' -> %00%27)
1818
1919
>>> tamper("1 AND '1'='1")
2020
'1 AND %00%271%00%27=%00%271'

tamper/appendnullbyte.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def dependencies():
1818

1919
def tamper(payload, **kwargs):
2020
"""
21-
Appends (Access) NULL byte character (%00) at the end of payload
21+
Appends an (Access) NULL byte character (%00) at the end of payload
2222
2323
Requirement:
2424
* Microsoft Access

tamper/base64encode.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ def dependencies():
1515

1616
def tamper(payload, **kwargs):
1717
"""
18-
Base64-encodes all characters in a given payload
18+
Encodes the entire payload using Base64
1919
2020
>>> tamper("1' AND SLEEP(5)#")
2121
'MScgQU5EIFNMRUVQKDUpIw=='

tamper/between.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def dependencies():
1616

1717
def tamper(payload, **kwargs):
1818
"""
19-
Replaces greater than operator ('>') with 'NOT BETWEEN 0 AND #' and equals operator ('=') with 'BETWEEN # AND #'
19+
Replaces the greater-than operator (>) with NOT BETWEEN 0 AND # and the equal sign (=) with BETWEEN # AND #
2020
2121
Tested against:
2222
* Microsoft SQL Server 2005

tamper/binary.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def dependencies():
1616

1717
def tamper(payload, **kwargs):
1818
"""
19-
Injects keyword binary where possible
19+
Injects the keyword binary where applicable
2020
2121
Requirement:
2222
* MySQL

tamper/bluecoat.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def dependencies():
1717

1818
def tamper(payload, **kwargs):
1919
"""
20-
Replaces space character after SQL statement with a valid random blank character. Afterwards replace character '=' with operator LIKE
20+
Replaces the space following an SQL statement with a random valid blank character, then converts = to LIKE
2121
2222
Requirement:
2323
* Blue Coat SGOS with WAF activated as documented in

tamper/chardoubleencode.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def dependencies():
1616

1717
def tamper(payload, **kwargs):
1818
"""
19-
Double URL-encodes all characters in a given payload (not processing already encoded) (e.g. SELECT -> %2553%2545%254C%2545%2543%2554)
19+
Double URL-encodes each character in the payload (ignores already encoded ones) (e.g. SELECT -> %2553%2545%254C%2545%2543%2554)
2020
2121
Notes:
2222
* Useful to bypass some weak web application firewalls that do not double URL-decode the request before processing it through their ruleset

tamper/randomcomments.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616

1717
def tamper(payload, **kwargs):
1818
"""
19-
Add random inline comments inside SQL keywords (e.g. SELECT -> S/**/E/**/LECT)
19+
Inserts random inline comments within SQL keywords (e.g. SELECT -> S/**/E/**/LECT)
2020
2121
>>> import random
2222
>>> random.seed(0)

0 commit comments

Comments
 (0)