sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
4500 / day
5000 / day
2.5 pages per visit
Domain Rating
Domain Authority
Citation Level
English, etc
Boolean-based blind, time-based blind, error-based, UNION query-based, stacked queries and out-of-band.
Supports connecting to the database without passing via a SQL injection, by providing DBMS credentials, IP address, port and database name.
Automatically identifies the database structure and retrieves the data.
Supports cracking password hashes using a dictionary-based attack.
Allows for file system access on the database server.
Enables command execution on the database server's operating system.
Facilitates complex attacks requiring out-of-band communication.
Allows for privilege escalation on the database server.
sqlmap is released under the GPLv2 license.
The source code is hosted on GitHub, allowing for community contributions and forks.
sqlmap has a vibrant community of users and developers. Support is available through forums, GitHub issues, and IRC channels.
Comprehensive documentation is available, including a user manual, wiki, and a series of tutorials and videos.
sqlmap is compatible with any Python-supported platform, including Windows, Linux, and macOS.
Security headers report is a very important part of user data protection. Learn more about http headers for sqlmap.org