

SQLi Dumper: Note: all of these tools have been collected from a virus-free source! But even so, some anti-virus may detect as a virus. ('ex : python ' + os.path.basename(sys.argv) + ' /etc/issue issue_new_copy\r\n') ('ex : python ' + os.path.basename(sys.argv) + ' /etc/issue\r\n') ('ex : python ' + os.path.basename(sys.argv) + ' /etc\r\n') ('usage : python ' + os.path.basename(sys.argv) + ' \r\n') If not len(sys.argv) = 3 and not len(sys.argv) = 2: Tool called xplor.py and here it's the sourceĭef copyfile(source, dest, buffer_size=1024*1024): Here we will talk about an other tool who use python permission to read other folders/ files in same server. Let's go with next method of symlink server bypassing, like u see and into before post now i will explain a new trick with an other tool. -Suport single proxy or proxies list (random/by order).-Back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running custom SQL statements, suport save/load sessions to XML file.-Small browser you can use to Union Count, view source code and HTTP headers.-Database to collect all vulnerabilities (with option to search for data in mass).-Trash System (you never exploit the same URL).-Suport MySQL Union, MySQL Error, MS SQL Union, MS SQL Error Integer/String.-You can see everthing that is load by HTTP request (HTTP Debbuger).-Easy switch vulnerabilities to vulnerabilities.-Dumper can dump large data, with greats control of delay per request (multi-threading).



