Menu

Tree [3bb547] master /
 History

HTTPS access


File Date Author Commit
 include 2010-10-28 MatToufoutu MatToufoutu [0f2e3d] first git commit
 ui 2010-10-28 MatToufoutu MatToufoutu [0f2e3d] first git commit
 COPYING 2010-10-28 MatToufoutu MatToufoutu [0f2e3d] first git commit
 ExploitMyUnion.py 2010-10-28 MatToufoutu MatToufoutu [0f2e3d] first git commit
 README.md 2010-10-30 MatToufoutu MatToufoutu [3bb547] removed IDE project file and reformatted README

Read Me

ExploitMyUnion2

ExploitMyUnion is a tool written in Python with a PyQt user interface
meant to simplify sql injection exploitation.

Contact

  • MatToufoutu: mattoufootu[at]gmail.com
  • Freko28: freko_v28s[at]hotmail.fr

Dependencies

  • python (>=2.5)
  • PyQt4

Features

  • Injection via GET/POST/COOKIE.
  • Quoted injections support.
  • HTTP proxy support.
  • SQL 'load_file()' function support.
  • SQL 'INTO OUTFILE' statement support.
  • Ability to save/restore injection parameters.
  • Can dump a table in sql format.

Usage

Just look at the GUI's tooltips. If you don't understand, go back to your game-boy.

Tips

  • While filling request parameters, if you press <enter> in the name field,
    the parameter is automatically added as injectable. If you press <enter>
    in the value field, the parameter will be added with its entered value.</enter></enter>
  • When you select a database entry, it is automaticaly copied to the
    clipboard