Menu

Tree [3bb547] master /
 History

HTTPS access


File Date Author Commit
 include 2010-10-28 MatToufoutu MatToufoutu [0f2e3d] first git commit
 ui 2010-10-28 MatToufoutu MatToufoutu [0f2e3d] first git commit
 COPYING 2010-10-28 MatToufoutu MatToufoutu [0f2e3d] first git commit
 ExploitMyUnion.py 2010-10-28 MatToufoutu MatToufoutu [0f2e3d] first git commit
 README.md 2010-10-30 MatToufoutu MatToufoutu [3bb547] removed IDE project file and reformatted README

Read Me

ExploitMyUnion2

ExploitMyUnion is a tool written in Python with a PyQt user interface
meant to simplify sql injection exploitation.

Contact

  • MatToufoutu: mattoufootu[at]gmail.com
  • Freko28: freko_v28s[at]hotmail.fr

Dependencies

  • python (>=2.5)
  • PyQt4

Features

  • Injection via GET/POST/COOKIE.
  • Quoted injections support.
  • HTTP proxy support.
  • SQL 'load_file()' function support.
  • SQL 'INTO OUTFILE' statement support.
  • Ability to save/restore injection parameters.
  • Can dump a table in sql format.

Usage

Just look at the GUI's tooltips. If you don't understand, go back to your game-boy.

Tips

  • While filling request parameters, if you press <enter> in the name field,
    the parameter is automatically added as injectable. If you press <enter>
    in the value field, the parameter will be added with its entered value.</enter></enter>
  • When you select a database entry, it is automaticaly copied to the
    clipboard
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.