sqlMap
Automatic sql mapping tool. Dangerous when not used correctly.
Usage
sqlmap -u <URL> --schema --batch
// sqlmap -u "https://0ade00760453a984801da3af00b400b7.web-security-academy.net/filter?category=Toys+%26+Games" --schema --batchOUTPUT

Help output
└─$ sqlmap --help ___ H ___ [,]__ ___ ___ {1.7.8#stable} |_ -| . [)] | .'| . | || [)]||_|,| | ||V... |_| https://sqlmap.org
Usage: python3 sqlmap [options]
Options: -h, --help Show basic help message and exit -hh Show advanced help message and exit --version Show program's version number and exit -v VERBOSE Verbosity level: 0-6 (default 1)
Target: At least one of these options has to be provided to define the target(s)
Request: These options can be used to specify how to connect to the target URL
Injection: These options can be used to specify which parameters to test for, provide custom injection payloads and optional tampering scripts
Detection: These options can be used to customize the detection phase
Techniques: These options can be used to tweak testing of specific SQL injection techniques
Enumeration: These options can be used to enumerate the back-end database management system information, structure and data contained in the tables
Operating system access: These options can be used to access the back-end database management system underlying operating system
General: These options can be used to set some general working parameters
Miscellaneous: These options do not fit into any other category
Last updated