%FILENAME%
sqlninja-0.2.999-4-any.pkg.tar.xz

%NAME%
sqlninja

%BASE%
sqlninja

%VERSION%
0.2.999-4

%DESC%
A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end

%GROUPS%
archstrike
archstrike-webapps
archstrike-exploit
archstrike-fuzzers

%CSIZE%
531984

%ISIZE%
1592320

%MD5SUM%
a8d40028bb8c54a8925b166ba3efde1a

%SHA256SUM%
257395349cb910f74605c33da0a718b9fefa182c85a460cfc433feadf11383a9

%PGPSIG%
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

%URL%
http://sqlninja.sourceforge.net/

%LICENSE%
GPL2

%ARCH%
any

%BUILDDATE%
1565433070

%PACKAGER%
Mike Henze <cthulu201@archstrike.org>

%CONFLICTS%
sqlninja-svn

%DEPENDS%
perl
perl-netpacket
perl-net-pcap
perl-net-dns
perl-net-rawip
perl-io-socket-ssl
perl-dbi
perl-dbd-sqlite

%OPTDEPENDS%
metasploit-framework: to use the metasploit attack mode
tigervnc: a VNC client, vncviewer, to use the VNC payload

