Skip to content

glira/Tyrant-Sql

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Tyrant-SQL

Powerful GUI SQL injection Tool. SQLMap's GUI version.

⚠️ Important Notice

This is an updated version of the original Tyrant-SQL project.

This repository (glira/Tyrant-Sql) is a fork that has been updated by Gemayel to work with Python 3.10+ and modern libraries.

Project History & Credits

Original Developer: aron-bordin - Created the original Tyrant-SQL project for Python 2.7
Original Repository: https://github.com/aron-bordin/Tyrant-SQL

Fork Maintainer: glira - Maintains this fork repository
Fork Repository: https://github.com/glira/Tyrant-Sql

Python 3.10+ Update: Gemayel - Updated the codebase to work with Python 3.10+ and PySide6

Special thanks to aron-bordin for creating the original excellent SQLMap GUI tool.

What Was Updated

  • ✅ Migrated from Python 2.7 to Python 3.10+
  • ✅ Updated from PySide 1.2.0 to PySide6
  • ✅ Fixed all Python 2 to Python 3 syntax issues
  • ✅ Updated Qt API calls to PySide6 compatible versions
  • ✅ Improved error handling and output parsing
  • ✅ Added SQLMap path configuration option
  • ✅ Enhanced database and table detection algorithms
  • ✅ Better support for modern SQLMap versions

Requirements (Must be installed!!)

============

How to run

==========

  1. Install dependencies:

    pip install -r requirements.txt
  2. Run the application:

    python3 Tyrant.py
  3. Configure SQLMap path (if using external installation):

    • Go to Tyrant → Preferences → Python tab
    • Set the SQLMap path (e.g., /home/user/.sec/sqlmap/sqlmap.py or /home/user/.sec/sqlmap directory)

Using

=====

Method GET:

Just put the vulnerable link in the edit line and press Analyze. Wait for the process to finish and navigate through the databases and tables available.

Method POST:

Put the vulnerable link without the POST variables and set these variables in POST Data input. (e.g., Link = 192.168.0.4/index.php, Post data = id=1). Press Analyze and wait for the process to finish.

Raw Data

========

With Raw Data table you can see more information about the SQL injection. Raw Data is the SQLMap output.

License

========

This project is licensed under the GPL-3.0 License - see the LICENSE file for details.

Credits

========

Attribution Chain

  1. aron-bordin created the original Tyrant-SQL project (Python 2.7)
  2. glira maintains this fork repository
  3. Gemayel updated the code to Python 3.10+ and PySide6

About

Havij based SQL Injection Tool. It's a SqlMap GUI version.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors