Ecosyste.ms: OpenCollective
An open API service for software projects hosted on Open Collective.
github.com/ronin-rb/ronin-code-sql
A Ruby DSL for crafting SQL Injections
https://github.com/ronin-rb/ronin-code-sql
8937b5b20b7f52613c6c9f280c5f0a4f19dc69f3 authored about 16 years ago
9d0ea827ba472b3b981c97445be2877bef0de71e authored about 16 years ago
60bb980eab4a573b7ec973b9522f2a41b91b8806 authored about 16 years ago
d20a4fae8bd1b5f6310767da708c013172417229 authored about 16 years ago
c4aa03d53d1d06bf30fcd08e4c4e1c3dddef92b4 authored about 16 years ago
7dda262f4332650661d165593bc2a0903dbc6151 authored about 16 years ago
49bc9d0ae5eb529c3bdef44fde73859811127d55 authored about 16 years ago
eeec1ed9f2f286fadf2db087085799143bc03649 authored about 16 years ago
190a600c5fabc715974477693f081ef3ab7b0d58 authored about 16 years ago
beef23b388887fa7f7b42281298f1d97b47aa147 authored about 16 years ago
ac408bac94eb6a35655289be1136e22e5d33fe37 authored about 16 years ago
3f8a02d239c6e53d17158194c00e57d896536ef3 authored about 16 years ago
f7745fce3e772ca2219304a24775d5186bf8fc74 authored about 16 years ago
f5d0f7d8586cba319f88aead1bbe7d140ebfbbc8 authored about 16 years ago
73c36844a91406f572a7f4cdbea9c1229ebd7cae authored about 16 years ago
8754cb273ad84e7c16b986f75fe50368c8e525b7 authored about 16 years ago
ca43af3f6fa0293f06c573e1aad09e174ae5e9b4 authored about 16 years ago
9964fe25c3ff5ab2a73c1faabc68c1d2f96ff4d4 authored about 16 years ago
2e274c82cef9447bf856b53e98d5e783af2f78d1 authored about 16 years ago
* Fix spec/ paths.
c2c290a02f2b97a139951e62a8e1a37d857b5216 authored about 16 years ago141b1e4e09b48d8da65c80abdad97743ab835ded authored about 16 years ago
95c41f5d680004a2cb8df4a9317e71f1870855aa authored about 16 years ago
835aa9a4bef30069f87175cfdc419ab4c5934c8f authored about 16 years ago
* Require 'ronin/chars' instead and use Chars.numeric =~ str.
5a026369251272f974b3786a9da0dac8b7a0568a authored about 16 years ago* Require Ronin >= 0.1.3, for the removal of Ronin::Vulnerable.
1ec72e07336d0feb6348d575a779296d46499e9e authored about 16 years ago52c39a2b79bc3cf1985ebf35982d7bf9f154d0d9 authored about 16 years ago
b8779b602368fe8f69c5472c1c0b870536644a56 authored about 16 years ago
fd51e947ed5b855a307b43bb97756b2c236746f4 authored about 16 years ago
9ae3ff24d477c6bf35206c82a43d8697b90e07ae authored about 16 years ago
2a77ef1c30d47a6134fdc3f22142da22f93bbf16 authored about 16 years ago
30af1efc6747f4d9998332b1f25acd971ce86011 authored about 16 years ago
32aea7917ed9452dd40a4b26739d1befeef9a91a authored about 16 years ago
2adcd224cb02d576fc4031215d3eca551fa1ba48 authored about 16 years ago
040031696e6320ca4b0db49fd331467ac20f32b0 authored about 16 years ago
* First attempt to decode SQL hex-strings.
* Then attempt to decode normal SQL escaped strings.
82cb019ac817ec169707c26668bab37e24a47bcd authored about 16 years ago
f5f1baadf35e26a7bf6b0bae911ba1a1dfd19c5f authored about 16 years ago
43a99d51e0adfce67b933ca9101113ac724b89ad authored about 16 years ago
7541d9c467a5dcfca33575a67425e9cecd2f549d authored about 16 years ago
63b734d49623a6963b61c042c43cdc5aea465187 authored about 16 years ago
0b6e25ca13043c8639a60f6d1585dc3d5279a079 authored about 16 years ago
f21c9c5978ea55e7b7376f3376dfc6fe1518bdbf authored about 16 years ago
1d152531d86a3d885edf172d61926cf143ccd77f authored about 16 years ago
b1d2783cfba0c8303a7904fd8f224180fdd49745 authored about 16 years ago
b554057109935d4cbdd072913321fb8474f48a48 authored about 16 years ago
1e8f47ea1a123bf8eb3adece1492859141712005 authored about 16 years ago
26b774dd5fc3f8d70fd0963c86a83c7c2c4e0407 authored about 16 years ago
bff57d4475bd8da0d6a833b384c95baeb3fd6aab authored about 16 years ago
9be1a3863c9dfe5f362e571a66fe9505ff5effdc authored about 16 years ago
4cb3fa1527520b90440ee5bd4abb25cc4554dc39 authored about 16 years ago
434e2847a4b7466d3f34b8155a60ec302009d865 authored about 16 years ago
b780dd5fbe1a51254fc53d92842450431186de9d authored about 16 years ago
56aa4a3fbf647a8922967bd031bbb9894d8cd758 authored about 16 years ago
d948f96110b18be0879acfd54eec72935aa10162 authored about 16 years ago
b05857fedaf8ec0377cf1a22a79d866772833612 authored about 16 years ago
* Use the new Web.spider_site method.
* Test on URLs which match the regexp /\?[a-zA-Z0-9]/ for ...
* Escape the SQL using the query-param value, not it's name.
* Compact the injection filtering c...
1a48f4d9f0746c72f7d47c6e8639f01cd76ee46f authored about 16 years ago
57b9ad17d2c61f77ea4f3f80a159f1e61ccb14c0 authored about 16 years ago
* Added Injection#has_column?.
* Added Injection#has_table?.
* Added Injection#uses_column?.
* A...
a216bcbff523f0b9ec59b56db17a986007d6f187 authored about 16 years ago
39e8d0e7366b127e07c5b076cbb53d08d12bdd4f authored about 16 years ago
* Escape the injections uses the original param value, so that our
injections can be compared ...
ff3e018fb4d9346b6e7c56a8885f8f27bff9881a authored about 16 years ago
64e6dbc599f0fcdcb68833ca4d56ffacb8eb0e29 authored about 16 years ago
b24dce71eee6a5c286afa1e2c35f29eaf95b3545 authored about 16 years ago
f84e6405a3e554febc550f22b5cfd3061e04fff1 authored about 16 years ago
2390ca0ca9601073bc42d839d30a4ff58de75485 authored about 16 years ago
bc25130a14a7d4444e0e35a7284d9b43c1cd4b68 authored about 16 years ago
a9542e6f1d6a9763d5ad65cc9a23c2aa5090f290 authored about 16 years ago
* Updated URI::HTTP#sql_errors to use SQL::Injection#error.
* Added URI::HTTP#sql_injections, th...
c0d913316a70854fabbe79391efa28c6ba582084 authored about 16 years ago
d6ca56246fe62887801d731ab9c6182a03254ce5 authored about 16 years ago
* Renamed local variables no_rows and all_rows, apparently these were
doing odd things to our ...
* Do not default @close_string to true.
* Initialize @expression after @dialect has been set.
* Since we have method_missing relaying statement calls to the dialect,
we can handle blocks d...
d1750ed533ac6f3a341b2f99bb4a1a6c3cf0cf0c authored about 16 years ago
* Should pass in @name to Message.new, not @type.
bbe11c34850bc8b7deee8c33ee902f62c1c23e3a authored about 16 years ago
* Remove the entry about blind SQL injection tests, SQL::Injection now
provides that.
* Add an...
* Use Error.message and Error.has_message?.
* Added the inject_error method.
* Allow the inject ...
* Adjusted documentation accordingly.
517d899495179b2b4941e04aea18ebe2295dba73 authored about 16 years ago7e42b8feda18ba073f3219fa3d0bca511019e091 authored about 16 years ago
71e497ca82591897c997f929eb229bc339f1a28f authored about 16 years ago
* Added documentation.
* Use the SQL::Error::Pattern#=~ operator.
1184de01bbe4715591e12b91d1d8f495e159172c authored about 16 years ago
b3c8e46c3c836587772bd85f5235845e995cb890 authored about 16 years ago
4d9969320cf40069db53f4d1b9319ec60920cac8 authored about 16 years ago
d05a48b2b3cbfe5167a685b1925097abb887c44b authored about 16 years ago
90758988a333da39a60bbcc3f03a5e1bd8776964 authored about 16 years ago
* Emit the name of the table/index/view to drop as a value.
* Remove the @table attribute.
* If end_statement is enabled, emit the injection expression before the
separator.
* Use strin...
* Allow empty sql statements.
* When not in multiline mode, separate expressions using a ';' and...
82ae2604a8f23d6a47cba5c617490237ead3a915 authored about 16 years ago
* Removed escaping methods, control escaping with variables instead.
* Allow for escaping string...
6d122c673bf335ec90c2aaede0782b158df3cdf4 authored about 16 years ago
529e7e3ba387363d623c9adbaf055b96c2cd863a authored about 16 years ago
b2d2dd13ee39e0b6b82974fe3eb81960cd22b350 authored about 16 years ago
0546f047afc48e9503d0d36d42cc3f70f983e7a6 authored over 16 years ago
d6c3d3ce2f8cb1f924d6ea809bd78fc7ee3fef84 authored over 16 years ago
1af298ddff42494cb858bfd1014fa737ea400407 authored over 16 years ago