A powerful bash script that enhances and automates SQLMap operations for SQL injection testing with advanced output processing and data organization.
This tool is intended for legal security testing purposes only. Using this tool against any website or application without explicit permission is illegal. Always ensure you have proper authorization before conducting security tests.
This script streamlines SQLMap usage for security professionals by:
- Automating common SQLMap commands with an easy-to-use interface
- Organizing extracted data in a structured, readable format
- Providing an interactive menu for various SQL injection testing options
- Extracting and organizing database schemas and content systematically
- Capturing and securely storing password hashes and credentials
- Generating comprehensive reports of discovered vulnerabilities
- Interactive testing menu with guided options
- Support for both URL targets and request file inputs
- DBMS type specification for targeted testing
- Structured output organization in user-defined directories
- Complete database enumeration and discovery
- Table schema automatic extraction and organization
- Intelligent data extraction from vulnerable tables
- Password hash capture and secure storage
- System information gathering (OS, hostname, web server details)
- Privilege escalation opportunity detection
- Rebuilds structure logs with consistent formatting
- Deduplicates extracted data for clean results
- Creates separate files for each database and table
- Merges cached results to prevent data loss
- Maintains session context across multiple runs
- Clone the repository using the following command:
git clone https://github.com/YanivHaliwa/sqlmap_enhance.git
cd sqlmap_enhance
-
Navigate to the SQLMap enhance directory:
cd Cyber-Stuff/sqlmap_enhance
-
Make the script executable:
chmod +x sqlmLite sqlmPro sqlway
-
Ensure you have SQLMap installed:
# Install sqlmap if not already installed sudo apt-get install sqlmap
./sqlm -r <request-file> | -u <url-or-ip> [-d <dbms>]
-r
- Specify a request file (captured HTTP request)-u
- Specify a target URL or IP address-d
- Specify the DBMS type (optional)
./sqlm -u "http://vulnerable-site.com/page.php?id=1"
./sqlm -r request.txt
./sqlm -u "http://vulnerable-site.com/page.php?id=1" -d mysql
- SQLMap installed and available in PATH
- Bash shell environment
- Standard Unix utilities
- Only use on systems you have explicit permission to test
- Handle extracted data securely and confidentially
- Follow responsible disclosure practices
- Delete sensitive extracted data when testing is complete
This script is provided for educational and professional security testing purposes only.
Created by Yaniv Haliwa for security testing and educational purposes.