%FILENAME%
sqlninja-0.2.999-4-any.pkg.tar.xz

%NAME%
sqlninja

%BASE%
sqlninja

%VERSION%
0.2.999-4

%DESC%
A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end

%GROUPS%
archstrike
archstrike-webapps
archstrike-exploit
archstrike-fuzzers

%CSIZE%
532492

%ISIZE%
1592320

%MD5SUM%
6e376c453782890cb41b5e01196f10bc

%SHA256SUM%
0636f96417126ef182d300aa2aa920df447700b33f9baeb4a2da1f0a9943f497

%PGPSIG%
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

%URL%
http://sqlninja.sourceforge.net/

%LICENSE%
GPL2

%ARCH%
any

%BUILDDATE%
1565433236

%PACKAGER%
Kevin MacMartin <prurigro@archstrike.org>

%CONFLICTS%
sqlninja-svn

%DEPENDS%
perl
perl-netpacket
perl-net-pcap
perl-net-dns
perl-net-rawip
perl-io-socket-ssl
perl-dbi
perl-dbd-sqlite

%OPTDEPENDS%
metasploit-framework: to use the metasploit attack mode
tigervnc: a VNC client, vncviewer, to use the VNC payload

