sqlmap is an automatic SQL injection tool entirely developed in Python. It is capable to perform an extensive database management system back-end fingerprint, retrieve remote DBMS databases, usernames, tables, columns, enumerate entire DBMS, read system files and much more taking advantage of web application programming security flaws that lead to SQL injection vulnerabilities.
Created attachment 199521 [details] sqlmap-0.7.ebuild Find attached ebuild for version 0.7 Originally taken from pentoo repository https://www.pentoo.ch/pentoo/browser/portage/trunk/dev-db/sqlmap/sqlmap-0.6.4.ebuild?rev=624
Using ebuilds from https://code.google.com/p/pentoo/source/browse/portage/trunk/dev-db/sqlmap is a good start, but I do not like precompiled .so. A useflag driven choice to recompile it or do not use it must be done.
Hello, I'm the one who maintain sqlmap in Pentoo overlay. These .so are used on the target system only so I let it go this way. The source code is public https://github.com/sqlmapproject/udfhack. But it is probably not possible to compile non-linux (windows vcproj -> .dll) binaries and I don't see any point by doing it half-way.
Here is how other distributions solve it: https://repology.org/metapackage/sqlmap/versions
sqlmap was introduced via commit https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=0c2636d824eb25536bd113fba5e2f783568558ff commit 0c2636d824eb25536bd113fba5e2f783568558ff Author: Mario Haustein <mario.haustein@hrz.tu-chemnitz.de> Date: Fri Mar 11 17:08:38 2022 +0100