برنامج اختراق من المصدر Sculptor

مشاهدات الان
يتم استخدام التطبيق لإجراء اختبار الأتمتة واستغلال الثغرات الأمنية لحقن SQL

http://sculptordev.com
اختراق المواقع المصابة ب sql عن طريق برنامج sculptor على الوندوز- exploit sql inject with sculptor
https://youtu.be/XoqPrATUNTE
Sculptor is a powerful tool which used for testing and exploiting SQL injection vulnerabilities and have wonderful user interface.
Here are some features about Sculptor:
- Sculptor supports the following databases:
MySQL
SQL Server
Microsoft Access
- Sculptor supports the following injection types:
Classic SQL injection
Blind SQL injection
- Sculptor supports automatic site scanning for SQl injection [Full Site SQLI scanner].
- Sculptor supports SQL Bypass Authentication [Bypass authentication Engine].
- Sculptor supports auto detects vulnerability.
- Sculptor supports specific injections[Manaual Query].
- Sculptor supports injection for sites which required logging.
- Sculptor supports Hyper Text Transfer Protocol with Secure Sockets Layer (SSL) [HTTPS].
- Sculptor supports HTTP Get and Post type.
- Sculptor supports HTTP Post and has 3 methods for Post injection [HTTP Post Engine feature].
- Sculptor supports executing specific queries in DB.
- Sculptor supports dumping data to HTML file or XML File.
- Sculptor supports getting all databases.
- Sculptor supports end query with any text feature.
- Sculptor Supports proxy.
- Sculptor supports control panel search feature.
- Sculptor supports crawling and export links.
- Interactive user interface
You can see videos about how to use some features in Sculptor application
تدخل على الريجستن
البحث عن
Sculptor INC
و
Sculptor
وتحذف التالي
sculptor.help@gmail.com
Cyb3r-1sT
واذ شفت شي اخر انسفه

إرسال تعليق

أحدث أقدم