sqlc - Universal DBMS/SQL client with exfiltration features :)
Go
Switch branches/tags
Nothing to show
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
.circleci
.gitignore
.travis.yml
LICENSE
README.md
TODO
sqlc.go

README.md

Build Status Circle Status

sqlc

sqlc - Universal DBMS/SQL client with exfiltration features :)

SQLc is universal and portable DBMS client. Although, it can be used as such, it have some universal features in order to help penetration testers. Imaging doing heavy exploitation behind perimeter and getting access to database, but still having hard time silently exfiltrating data from database? sqlc comes to rescue as single fat client for most popular databases! Also, it comes with different database exfiltration methods, so you can finally test your database firewall.

installation

Standard go way on github:

git clone https://github.com/kost/sqlc
cd sqlc
go get
go build

usage

listing database drivers

./sqlc list
mssql
mysql
postgres
sqlite3
sqlserver

console

./sqlc console

dumping

./sqlc dump

execute single query

./sqlc -q 'SELECT * FROM users'

Examples

PostgreSQL

./sqlc -d postgres -c "user=db password=db database=db host=172.17.0.2 sslmode=disable" console

MySQL dump

Note: when SQLC_COMMAND is specified, all command line options are ignored. Due to stealthy dump...

export SQLC_CONN=dbuser:dbpasswd@tcp\(127.0.0.1\)/dbname
export SQLC_DRIVER=mysql
export SQLC_MAX_ROWS=100
export SQLC_MIN_ROWS=1000
export SQLC_MIN_DELAY=15s
export SQLC_MAX_DELAY=45s
export SQLC_TABLE=users
export SQLC_COMMAND=dump
./sqlc smtp trivial rewrite --all-options-ignored