بحث

برنامج اختراق من المصدر Sculptor

مشاهدات الان


يتم استخدام التطبيق لإجراء اختبار الأتمتة واستغلال الثغرات الأمنية لحقن SQL



http://sculptordev.com

اختراق المواقع المصابة ب sql عن طريق برنامج sculptor على الوندوز- exploit sql inject with sculptor

https://youtu.be/XoqPrATUNTE

Sculptor is a powerful tool which used for testing and exploiting SQL injection vulnerabilities and have wonderful user interface.

Here are some features about Sculptor:

- Sculptor supports the following databases:

MySQL

SQL Server

Microsoft Access

- Sculptor supports the following injection types:

Classic SQL injection

Blind SQL injection

- Sculptor supports automatic site scanning for SQl injection [Full Site SQLI scanner].

- Sculptor supports SQL Bypass Authentication [Bypass authentication Engine].

- Sculptor supports auto detects vulnerability.

- Sculptor supports specific injections[Manaual Query].

- Sculptor supports injection for sites which required logging.

- Sculptor supports Hyper Text Transfer Protocol with Secure Sockets Layer (SSL) [HTTPS].

- Sculptor supports HTTP Get and Post type.

- Sculptor supports HTTP Post and has 3 methods for Post injection [HTTP Post Engine feature].

- Sculptor supports executing specific queries in DB.

- Sculptor supports dumping data to HTML file or XML File.

- Sculptor supports getting all databases.

- Sculptor supports end query with any text feature.

- Sculptor Supports proxy.

- Sculptor supports control panel search feature.

- Sculptor supports crawling and export links.

- Interactive user interface

You can see videos about how to use some features in Sculptor application


تدخل على الريجستن

البحث عن

Sculptor INC

و

Sculptor

وتحذف التالي

sculptor.help@gmail.com

Cyb3r-1sT

واذ شفت شي اخر انسفه


إرسال تعليق

0 تعليقات