Tree [3bb547] master /
History



File Date Author Commit
include 2010-10-28 MatToufoutu MatToufoutu [0f2e3d] first git commit
ui 2010-10-28 MatToufoutu MatToufoutu [0f2e3d] first git commit
COPYING 2010-10-28 MatToufoutu MatToufoutu [0f2e3d] first git commit
ExploitMyUnion.py 2010-10-28 MatToufoutu MatToufoutu [0f2e3d] first git commit
README.md 2010-10-30 MatToufoutu MatToufoutu [3bb547] removed IDE project file and reformatted README

Read Me

ExploitMyUnion2

ExploitMyUnion is a tool written in Python with a PyQt user interface
meant to simplify sql injection exploitation.

Contact

  • MatToufoutu: mattoufootu[at]gmail.com
  • Freko28: freko_v28s[at]hotmail.fr

Dependencies

  • python (>=2.5)
  • PyQt4

Features

  • Injection via GET/POST/COOKIE.
  • Quoted injections support.
  • HTTP proxy support.
  • SQL 'load_file()' function support.
  • SQL 'INTO OUTFILE' statement support.
  • Ability to save/restore injection parameters.
  • Can dump a table in sql format.

Usage

Just look at the GUI's tooltips. If you don't understand, go back to your game-boy.

Tips

  • While filling request parameters, if you press <Enter> in the name field,
    the parameter is automatically added as injectable. If you press <Enter>
    in the value field, the parameter will be added with its entered value.
  • When you select a database entry, it is automaticaly copied to the
    clipboard