%FILENAME%
sqlninja-0.2.999-4-any.pkg.tar.xz

%NAME%
sqlninja

%BASE%
sqlninja

%VERSION%
0.2.999-4

%DESC%
A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end

%GROUPS%
archstrike
archstrike-webapps
archstrike-exploit
archstrike-fuzzers

%CSIZE%
532196

%ISIZE%
1592320

%MD5SUM%
9a555cfcac4d1d3dd212c1bd1fee16d9

%SHA256SUM%
74dc24f7a2bee51fd3264bd76d86e9c69ae87f9975eabb758d2fa711f6d4b64e

%PGPSIG%
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

%URL%
http://sqlninja.sourceforge.net/

%LICENSE%
GPL2

%ARCH%
any

%BUILDDATE%
1565433074

%PACKAGER%
Mike Henze <cthulu201@archstrike.org>

%CONFLICTS%
sqlninja-svn

%DEPENDS%
perl
perl-netpacket
perl-net-pcap
perl-net-dns
perl-net-rawip
perl-io-socket-ssl
perl-dbi
perl-dbd-sqlite

%OPTDEPENDS%
metasploit-framework: to use the metasploit attack mode
tigervnc: a VNC client, vncviewer, to use the VNC payload

