%FILENAME%
sqlninja-0.2.999-3-any.pkg.tar.xz

%NAME%
sqlninja

%VERSION%
0.2.999-3

%DESC%
A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end

%GROUPS%
archstrike
archstrike-webapps
archstrike-exploit
archstrike-fuzzers

%CSIZE%
531976

%ISIZE%
1592320

%MD5SUM%
03de1baad5391e6f14a73385a844c24e

%SHA256SUM%
b56f5ce1ac7f1082c144a3af36f50907b997ae53dae982023bb637db92c4f43e

%PGPSIG%
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

%URL%
http://sqlninja.sourceforge.net/

%LICENSE%
GPL2

%ARCH%
any

%BUILDDATE%
1490374525

%PACKAGER%
Kevin MacMartin <prurigro@archstrike.org>

%CONFLICTS%
sqlninja-svn

%DEPENDS%
perl
perl-netpacket
perl-net-pcap
perl-net-dns
perl-net-rawip
perl-io-socket-ssl
perl-dbi
perl-dbd-sqlite

%OPTDEPENDS%
metasploit: to use the metasploit attack mode
tigervnc: a VNC client, vncviewer, to use the VNC payload

