sqlmap
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers
Name:sqlmap
Category:Vulnerabilities
Publisher:trickest
Created:9/7/2021
Container:
quay.io/trickest/sqlmap:de66b69
Output Type:
License:Unknown
Source:View Source
Parameters
--os
Force back-end DBMS operating system to provided value--all
Retrieve everything--dbs
Enumerate DBMS databases--eta
Display for each output the estimated time of arrival--hex
Use hex conversion during data retrieval--hpp
Use HTTP parameter pollution method--tor
Use Tor anonymity network--url
Target URL (e.g. http://www.site.com/vuln.php?id=1)--code
HTTP code to match when query is evaluated to True--data
Data string to be sent through POST (e.g. id=1)--dbms
Force back-end DBMS to provided value--dump
Dump DBMS database table entries--eval
Evaluate provided Python code before the request (e.g. import hashlib;id2=hashlib.md5(id).hexdigest())--host
HTTP Host header value--last
Last query output word character to retrieve--risk
Risk of tests to perform (1-3, default 1)--skip
Skip testing for given parameter(s)--stop
Last dump table entry to retrieve-U
DBMS user to enumerate--alert
Run host OS command(s) when SQL injection is found--count
Retrieve number of entries for table(s)--crawl
Crawl the website starting from the target URL--delay
Delay in seconds between each HTTP request--first
First query output word character to retrieve--forms
Parse and test forms on target URL--gpage
Use Google dork results from specified page number--level
Level of tests to perform (1-5, default 1)--proxy
Use a proxy to connect to the target URL--purge
Safely remove all content from sqlmap data directory--roles
Enumerate DBMS users roles--scope
Regexp for filtering targets--smart
Perform thorough tests only if positive heuristic(s)--start
First dump table entry to retrieve-T
DBMS database table(s) to enumerate--users
Enumerate DBMS users--where
Use WHERE condition while table dumping--banner
Retrieve DBMS banner--base64
Parameter(s) containing Base64 encoded data-C
DBMS database table column(s) to enumerate--cookie
HTTP Cookie header value (e.g. PHPSESSID=a8d127e..)--header
Extra header (e.g. X-Forwarded-For: 127.0.0.1)--is-dba
Detect if the DBMS current user is DBA--method
Force usage of given HTTP method (e.g. PUT)--mobile
Imitate smartphone through HTTP User-Agent header--os-bof
Stored procedure buffer overflow exploitation--os-cmd
Execute an operating system command--os-pwn
Prompt for an OOB shell, Meterpreter or VNC--prefix
Injection payload prefix string--regexp
Regexp to match when query is evaluated to True--repair
Redump entries having unknown character marker (?)--schema
Enumerate DBMS schema--search
Search column(s), table(s) and/or database name(s)--string
String to match when query is evaluated to True--suffix
Injection payload suffix string--tables
Enumerate DBMS database tables--tamper
Use given script(s) for tampering injection data--titles
Compare pages based only on their titles--answers
Set predefined answers (e.g. quit=N,follow=N)--charset
Blind SQL injection charset (e.g. 0123456789abcdef)--chunked
Use HTTP chunked transfer encoded (POST) requests--cleanup
Clean up the DBMS from sqlmap specific UDF and tables--columns
Enumerate DBMS database table columns--csv-del
Delimiting character used in CSV output (default ,)--headers
Extra headers (e.g. Accept-Language: fr
ETag: 123)--no-cast
Turn off payload casting mechanism--offline
Work in offline mode (only use session data)--referer
HTTP Referer header value--reg-add
Write a Windows registry key value data--reg-del
Delete a Windows registry key value--reg-key
Windows registry key--retries
Retries when the connection timeouts (default 3)--threads
Max number of concurrent HTTP(s) requests (default 1)--timeout
Seconds to wait before timeout connection (default 30)--comments
Check for DBMS comments during enumeration--csrf-url
URL address to visit for extraction of anti-CSRF token-D
DBMS database to enumerate--dump-all
Dump all DBMS databases tables entries--encoding
Character encoding used for data retrieval (e.g. GBK)--hostname
Retrieve DBMS server hostname-l
Parse target(s) from Burp or WebScarab proxy log file--os-shell
Prompt for an interactive operating system shell--priv-esc
Database process user privilege escalation--reg-data
Windows registry key value data--reg-read
Read a Windows registry key value--reg-type
Windows registry key value type--retry-on
Retry request on regexp matching content (e.g. drop)--safe-req
Load safe HTTP request from a file--safe-url
URL address to visit frequently during testing--skip-waf
Skip heuristic detection of WAF/IPS protection--sql-file
Execute SQL statements from given file(s)--time-sec
Seconds to delay the DBMS response (default 5)--tmp-path
Remote absolute path of temporary files directory--tor-port
Set Tor proxy port other than default--tor-type
Set Tor proxy type (HTTP, SOCKS4 or SOCKS5 (default))--unstable
Adjust options for unstable connections--web-root
Web server document root directory (e.g. /var/www)--auth-cred
HTTP authentication credentials (name:password)--auth-file
HTTP authentication PEM cert/private key file--auth-type
HTTP authentication type (Basic, Digest, Bearer, ...)-m
Scan multiple targets given in a textual file--check-tor
Check to see if Tor is used properly--csrf-data
POST data to send during anti-CSRF token page visit--dbms-cred
DBMS authentication credentials (user:password)--file-dest
Back-end DBMS absolute filepath to write to--file-read
Read a file from the back-end DBMS file system--force-ssl
Force usage of SSL/HTTPS-z
Use short mnemonics (e.g. flu,bat,ban,tec=EU)--no-escape
Turn off string escaping mechanism--param-del
Character used for splitting parameter values (e.g. &)--passwords
Enumerate DBMS users password hashes--randomize
Randomly change value for given parameter(s)--reg-value
Windows registry key value--safe-freq
Regular requests between visits to a safe URL--safe-post
POST data to send to a safe URL--sql-query
SQL statement to be executed--sql-shell
Prompt for an interactive SQL shell--technique
SQL injection techniques to use (default BEUSTQ)--test-skip
Skip tests by payloads and/or titles (e.g. BENCHMARK)--text-only
Compare pages based only on the textual content-v
Verbosity level: 0-6 (default 1)--abort-code
Abort on (problematic) HTTP error code(s) (e.g. 401)--cookie-del
Character used for splitting cookie values (e.g. ;)--csrf-token
Parameter used to hold anti-CSRF token--current-db
Retrieve DBMS current database--dns-domain
Domain name used for DNS exfiltration attack--file-write
Write a local file on the back-end DBMS file system--keep-alive
Use persistent HTTP(s) connections--not-string
String to match when query is evaluated to False--preprocess
Use given script(s) for preprocessing (request)--privileges
Enumerate DBMS users privileges--proxy-cred
Proxy authentication credentials (name:password)--proxy-file
Load proxy list from a file--proxy-freq
Requests between change of proxy from a given list--second-req
Load second-order HTTP request from file--second-url
Resulting page URL searched for second-order response--shared-lib
Local path of the shared library--statements
Retrieve SQL statements being run on DBMS--time-limit
Run with a time limit in seconds (e.g. 3600)--udf-inject
Inject custom user-defined functions--union-char
Character to use for bruteforcing number of columns--union-cols
Range of columns to test for UNION query SQL injection--union-from
Table to use in FROM part of UNION query SQL injection--user-agent
HTTP User-Agent header value--base64-safe
Use URL and filename safe Base64 alphabet (RFC 4648)-c
Load options from a configuration INI file--csrf-method
HTTP method to use during anti-CSRF token page visit--dump-format
Format of dumped data (CSV (default), HTML or SQLITE)--fingerprint
Perform an extensive DBMS version fingerprint-g
Process Google dork results as target URLs--ignore-code
Ignore (problematic) HTTP error code(s) (e.g. 401)--os-smbrelay
One click prompt for an OOB shell, Meterpreter or VNC--postprocess
Use given script(s) for postprocessing (response)--skip-static
Skip testing parameters that not appear to be dynamic--test-filter
Select tests by payloads and/or titles (e.g. ROW)--common-files
Check existence of common files--csrf-retries
Retries for anti-CSRF token retrieval (default 0)--current-user
Retrieve DBMS current user--ignore-proxy
Ignore system default proxy settings--live-cookies
Live cookies file used for loading up-to-date values--load-cookies
File containing cookies in Netscape/wget format-o
Turn on all optimization switches--param-filter
Select testable parameter(s) by place (e.g. POST)--parse-errors
Parse and display DBMS error messages from responses--pivot-column
Pivot column name--random-agent
Use randomly selected HTTP User-Agent header value-r
Load HTTP request from a file-s
Load session from a stored (.sqlite) file--table-prefix
Prefix used for temporary tables (default: sqlmap)--union-values
Column values to use for UNION query SQL injection--binary-fields
Result fields having binary values (e.g. digest)--common-tables
Check existence of common tables--crawl-exclude
Regexp to exclude pages from crawling (e.g. logout)--flush-session
Flush session files for current target--fresh-queries
Ignore query results stored in session file--param-exclude
Regexp to exclude parameters from testing (e.g. ses)--abort-on-empty
Abort data retrieval on empty results--check-internet
Check Internet connection before assessing the target--common-columns
Check existence of common columns--exclude-sysdbs
Exclude DBMS system databases when enumerating tables--invalid-bignum
Use big numbers for invalidating values--invalid-string
Use random strings for invalidating values--predict-output
Predict common queries output--skip-urlencode
Skip URL encoding of payload data--drop-set-cookie
Ignore Set-Cookie header from response--ignore-timeouts
Ignore connection timeouts--invalid-logical
Use logical operations for invalidating values--null-connection
Retrieve page length without actual HTTP response body--skip-heuristics
Skip heuristic detection of vulnerabilities-p
Testable parameter(s)--disable-coloring
Disable console output coloring--ignore-redirects
Ignore redirection attempts-d
Connection string for direct database connection-X
DBMS database identifier(s) to not enumerate