%FILENAME%
sqlninja-0.2.999-3-any.pkg.tar.xz

%NAME%
sqlninja

%VERSION%
0.2.999-3

%DESC%
A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end

%GROUPS%
archstrike
archstrike-webapps
archstrike-exploit
archstrike-fuzzers

%CSIZE%
527432

%ISIZE%
1592320

%MD5SUM%
843861fd35b153c4ca33db57f90f3162

%SHA256SUM%
c421a0d4e0a00a93ea1a17ba092a0e767c0be9107879c4e6f3515093fb1c07cd

%PGPSIG%
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

%URL%
http://sqlninja.sourceforge.net/

%LICENSE%
GPL2

%ARCH%
any

%BUILDDATE%
1490407586

%PACKAGER%
Kevin MacMartin <prurigro@archstrike.org>

%CONFLICTS%
sqlninja-svn

%DEPENDS%
perl
perl-netpacket
perl-net-pcap
perl-net-dns
perl-net-rawip
perl-io-socket-ssl
perl-dbi
perl-dbd-sqlite

%OPTDEPENDS%
metasploit: to use the metasploit attack mode
tigervnc: a VNC client, vncviewer, to use the VNC payload

