Hello, I am writing a small modification which would allow to tamper/decode variables in the request? As I understand that the parameters are decoded/parsed into a dict after option.py:2323 (parseTargetDirect()), but where can I access the full, parsed dict of the get/post/cookie values?
(specifically I have a base64 encoded string as a parameter and to insert the payload, the parameter must be base64-decoded, injected and then encoded back) -- Konrads Smelkovs Applied IT sorcery. ------------------------------------------------------------------------------ _______________________________________________ sqlmap-users mailing list sqlmap-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/sqlmap-users