%FILENAME%
sqlninja-0.2.999-3-any.pkg.tar.xz

%NAME%
sqlninja

%VERSION%
0.2.999-3

%DESC%
A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end

%GROUPS%
archstrike
archstrike-webapps
archstrike-exploit
archstrike-fuzzers

%CSIZE%
531768

%ISIZE%
1592320

%MD5SUM%
5f60dbac1dc16b561035049e478befd9

%SHA256SUM%
edbbf031b7a545d305b6b9ab520100692003ad9583bfb23c72b2013f15f06343

%PGPSIG%
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

%URL%
http://sqlninja.sourceforge.net/

%LICENSE%
GPL2

%ARCH%
any

%BUILDDATE%
1490346439

%PACKAGER%
Kevin MacMartin <prurigro@archstrike.org>

%CONFLICTS%
sqlninja-svn

%DEPENDS%
perl
perl-netpacket
perl-net-pcap
perl-net-dns
perl-net-rawip
perl-io-socket-ssl
perl-dbi
perl-dbd-sqlite

%OPTDEPENDS%
metasploit: to use the metasploit attack mode
tigervnc: a VNC client, vncviewer, to use the VNC payload

