summaryrefslogtreecommitdiff
path: root/security/sqlmap
AgeCommit message (Collapse)AuthorFilesLines
2018-11-06sqlmap: Update security/sqlmap to 1.2.11leot3-15/+36
Changes: 1.2.11 ------ - Add support for H2 DBMS - Misc changes and bug fixes
2018-10-03sqlmap: Update security/sqlmap to 1.2.10leot3-12/+15
Changes: - Unfortunately no changelog is provided but according commit messages bug fixes and misc improvements
2018-09-05sqlmap: Update security/sqlmap to 1.2.9leot3-11/+38
Changes: Unfortunately no changelog is provided upstream. According skimming of commit messages mostly bug fixes since 1.2.
2018-08-22Recursive bump for perl5-5.28.0wiz1-1/+2
2018-07-03extend PYTHON_VERSIONS_ for Python 3.7adam1-2/+2
2018-01-21sqlmap: Update security/sqlmap to 1.2leot3-23/+54
Changes (unfortunately upstream does not provide any changelog, this is based by reading commit messages): 1.2 --- - Misc improvements and bug fixes 1.1.11 ------ - Add support for Apache SHA1 - Add support for Joomla password - Add support for vBulletin password hashes - Add support for DJANGO_MD5 and DJANGO_SHA1 - Add WAF script for Wordfence - Add WAF script for DOSarrest - Misc improvements and bug fixes 1.1.10 ------ - Polish translation - Add support for blind-based charset dump - Misc improvements and bug fixes
2017-09-14sqlmap: Update security/sqlmap to 1.1.9leot3-9/+13
Changes: 1.1.9 ----- - Misc bug fixes and improvements 1.1.8 ----- - Add support to log all HTTP traffic into an HAR file (via `--har' option) - Misc bug fixes 1.1.7 ----- - Add Bulgarian translation - Misc bug fixes and improvements 1.1.6 ----- - Misc bug fixes
2017-05-09Changes 1.1.5:adam3-22/+22
Bug fixes.
2017-03-23Extra scripts can need bash and perl.leot1-1/+4
Bump PKGREVISION Pointed out by <joerg>'s bulk builds
2017-03-13Import sqlmap-1.1.3 as security/sqlmapleot4-0/+1394
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.