Tool
CLI
Penetration Testing & Red Teaming

sqlmap

by sqlmapproject

36.3Kstars
6.2Kforks
1.1Kwatchers
Updated 19 days ago
About

sqlmap is an open source tool that automates the detection and exploitation of SQL injection vulnerabilities to take over database servers.

Automatic SQL injection and database takeover tool

Primary Use Case

Penetration testers and security researchers use sqlmap to identify and exploit SQL injection flaws in web applications, enabling them to assess database security and potential risks. It automates complex tasks like database fingerprinting, data extraction, and command execution on the underlying operating system, streamlining vulnerability assessments.

Key Features
  • Automated detection and exploitation of SQL injection vulnerabilities
  • Database fingerprinting and data extraction capabilities
  • Access to underlying file system via SQL injection
  • Execution of operating system commands through out-of-band connections
  • Support for multiple Python versions (2.6, 2.7, 3.x)
  • Powerful detection engine with numerous niche features
  • Extensive command-line switches for tailored testing

Installation

  • Clone the repository with: git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev
  • Alternatively, download the latest tarball from https://github.com/sqlmapproject/sqlmap/tarball/master
  • Or download the latest zipball from https://github.com/sqlmapproject/sqlmap/zipball/master
  • Ensure Python version 2.6, 2.7, or 3.x is installed on your system
  • Run sqlmap directly using Python without additional dependencies

Usage

>_ python sqlmap.py -h

Displays a list of basic options and switches available in sqlmap

>_ python sqlmap.py -hh

Displays a comprehensive list of all options and switches with detailed descriptions

Security Frameworks
Reconnaissance
Initial Access
Execution
Persistence
Impact
Usage Insights
  • Integrate sqlmap in red team toolkits for automated SQL injection exploitation and database takeover during engagements.
  • Use sqlmap outputs to improve blue team detection rules and signatures for SQL injection attempts.
  • Leverage sqlmap in purple team exercises to validate web application firewall (WAF) and input validation effectiveness.
  • Automate sqlmap scans in CI/CD pipelines to catch SQL injection vulnerabilities early in development.
  • Combine sqlmap with other exploitation frameworks like Metasploit for streamlined post-exploitation workflows.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about sqlmap. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

3 free chats per tool • Instant responses • No credit card

Security Profile
Red Team90%
Blue Team30%
Purple Team60%
Details
LicenseOther
LanguagePython
Open Issues5384
Topics
sql-injection
detection
exploitation
takeover
python
database
pentesting
vulnerability-scanner
sqlmap