01Built-in strategies for bypassing WAFs and firewalls using tamper scripts and custom headers.
020 GitHub stars
03Full database enumeration capabilities for tables, columns, and sensitive record dumping.
04Flexible target specification via direct URLs, HTTP request files, and bulk log parsing.
05Automated detection of diverse SQL injection techniques including Boolean, Time, Error, and UNION-based.
06Advanced exploitation support for password hash extraction and interactive OS shell access.