%FILENAME%
sqlninja-0.2.999-4-any.pkg.tar.xz

%NAME%
sqlninja

%BASE%
sqlninja

%VERSION%
0.2.999-4

%DESC%
A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end

%GROUPS%
archstrike
archstrike-webapps
archstrike-exploit
archstrike-fuzzers

%CSIZE%
531940

%ISIZE%
1592320

%MD5SUM%
f31e1aac4b20556093e2cbfb8e57729a

%SHA256SUM%
e22e9cd73ab53f0f3d4989a4761f4a142d5216324606dfc1d7f1a37c402a5eac

%PGPSIG%
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

%URL%
http://sqlninja.sourceforge.net/

%LICENSE%
GPL2

%ARCH%
any

%BUILDDATE%
1565433069

%PACKAGER%
Mike Henze <cthulu201@archstrike.org>

%CONFLICTS%
sqlninja-svn

%DEPENDS%
perl
perl-netpacket
perl-net-pcap
perl-net-dns
perl-net-rawip
perl-io-socket-ssl
perl-dbi
perl-dbd-sqlite

%OPTDEPENDS%
metasploit-framework: to use the metasploit attack mode
tigervnc: a VNC client, vncviewer, to use the VNC payload

