Sqlmap Tamper Bypass WAF

Source: Internet
Author: User

Apostrophemask.py replaces single-quote characters with UTF-8 full-width characters

apostrophenullencode.py replacing single quote characters with illegal double-byte Unicode characters

appendnullbyte.py. Add an empty character encoding at the end of payload

base64encode.py use BASE64 encoding for a given payload all characters

between.py with "not between 0 and #" to replace the greater than sign ">", "Between # and #" to replace the equals sign "="

Bluecoat.py replaced the whitespace with a valid random space character after the SQL statement, followed by "like" with the equals sign "="

chardoubleencode.py use double-URL encoding for all characters given payload (do not process encoded characters)

charencode.py. URL encoding for all characters given payload (do not process encoded characters)

charunicodeencode.py uses Unicode URL encoding for a given payload non-encoded character (does not process encoded characters)

Concat2concatws.py replacing an instance of "CONCAT (A, B)" with "Concat_ws (MID (CHAR (0), 0, 0), A, b)"

equaltolike.py. Replace all equals sign "=" with "like" operator

greatest.py replace the greater than sign ">" With the "greatest" function

halfversionedmorekeywords.py add a MySQL comment before each keyword

Ifnull2ifisnull.py replacing instances with "IF (ISNULL (a), B, A)" as "Ifnull (A, B)"

lowercase.py replace each keyword character with a lowercase value

modsecurityversioned.py surround a complete query with annotations

modsecurityzeroversioned.py the full query with a comment with a number zero

multiplespaces.py add multiple spaces around the SQL keyword

nonrecursivereplacement.py replacing predefined SQL keywords with representations for filters

overlongutf8.py convert all characters in a given payload

percentage.py. Add a percent semicolon before each character

Randomcase.py randomly converts the case of each keyword character

randomcomments.py inserting a random comment into the SQL keyword

securesphere.py adding a specially constructed string

sp_password.py Add "sp_password" for automatic obfuscation from DBMS logs to the end of payload

space2comment.py replacing whitespace with "/**/"

space2dash.py with dash notation "--" followed by a random string and a newline character to replace the whitespace

space2hash.py with the pound notation "#" followed by a random string and a newline character to replace the whitespace

space2morehash.py with the pound notation "#" followed by a random string and a newline character to replace the whitespace

space2mssqlblank.py replacing whitespace with random whitespace characters from a valid set of alternate character sets

space2mssqlhash.py with the pound notation "#" followed by a newline character replacing the whitespace

space2mysqlblank.py replace whitespace with random whitespace characters from a valid set of alternate character sets

space2mysqldash.py with dash notation "--" followed by a newline character replacing whitespace

space2plus.py replacing whitespace with a plus "+"

space2randomblank.py replace whitespace with random whitespace characters from a valid set of alternate character sets

unionalltounion.py Replace "union ALL Select" with "union select"

Panax Notoginseng. unmagicquotes.py replacing whitespace with a multibyte combination%bf%27 and the end-of-general comment

varnish.py Add an HTTP Header "X-originating-ip" to bypass the WAF

versionedkeywords.py surround each non-function keyword with mysql annotations

versionedmorekeywords.py surround each keyword with MySQL annotations

xforwardedfor.py add a forged HTTP header "X-forwarded-for" to bypass the WAF

Sqlmap Tamper Bypass WAF

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.