%FILENAME%
sqlninja-0.2.999-3-any.pkg.tar.xz

%NAME%
sqlninja

%VERSION%
0.2.999-3

%DESC%
A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end

%GROUPS%
archstrike
archstrike-webapps
archstrike-exploit
archstrike-fuzzers

%CSIZE%
532168

%ISIZE%
1592320

%MD5SUM%
7ef5f0cf6449d366e3a4bc4ba35d46a2

%SHA256SUM%
1eb218f852799cfd8e163109819efa5cc76193700eea06c8cc9376c03dc3dbb7

%PGPSIG%
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

%URL%
http://sqlninja.sourceforge.net/

%LICENSE%
GPL2

%ARCH%
any

%BUILDDATE%
1490367898

%PACKAGER%
Mike Henze <cthulu201@archstrike.org>

%CONFLICTS%
sqlninja-svn

%DEPENDS%
perl
perl-netpacket
perl-net-pcap
perl-net-dns
perl-net-rawip
perl-io-socket-ssl
perl-dbi
perl-dbd-sqlite

%OPTDEPENDS%
metasploit: to use the metasploit attack mode
tigervnc: a VNC client, vncviewer, to use the VNC payload

