Powerful GUI SQL injection Tool. SQLMap's GUI version.
This is an updated version of the original Tyrant-SQL project.
This repository (glira/Tyrant-Sql) is a fork that has been updated by Gemayel to work with Python 3.10+ and modern libraries.
Original Developer: aron-bordin - Created the original Tyrant-SQL project for Python 2.7
Original Repository: https://github.com/aron-bordin/Tyrant-SQL
Fork Maintainer: glira - Maintains this fork repository
Fork Repository: https://github.com/glira/Tyrant-Sql
Python 3.10+ Update: Gemayel - Updated the codebase to work with Python 3.10+ and PySide6
Special thanks to aron-bordin for creating the original excellent SQLMap GUI tool.
- ✅ Migrated from Python 2.7 to Python 3.10+
- ✅ Updated from PySide 1.2.0 to PySide6
- ✅ Fixed all Python 2 to Python 3 syntax issues
- ✅ Updated Qt API calls to PySide6 compatible versions
- ✅ Improved error handling and output parsing
- ✅ Added SQLMap path configuration option
- ✅ Enhanced database and table detection algorithms
- ✅ Better support for modern SQLMap versions
============
-
Python 3.10 or higher
- Download: https://www.python.org/downloads/
-
PySide6
- Install with:
pip install -r requirements.txt
- Install with:
-
SQLMap (optional - can use bundled version or configure custom path)
- Download: https://github.com/sqlmapproject/sqlmap
==========
-
Install dependencies:
pip install -r requirements.txt
-
Run the application:
python3 Tyrant.py
-
Configure SQLMap path (if using external installation):
- Go to Tyrant → Preferences → Python tab
- Set the SQLMap path (e.g.,
/home/user/.sec/sqlmap/sqlmap.pyor/home/user/.sec/sqlmapdirectory)
=====
Just put the vulnerable link in the edit line and press Analyze. Wait for the process to finish and navigate through the databases and tables available.
Put the vulnerable link without the POST variables and set these variables in POST Data input.
(e.g., Link = 192.168.0.4/index.php, Post data = id=1).
Press Analyze and wait for the process to finish.
========
With Raw Data table you can see more information about the SQL injection. Raw Data is the SQLMap output.
========
This project is licensed under the GPL-3.0 License - see the LICENSE file for details.
========
- Original Developer: aron-bordin - Original Repository
- Fork Maintainer: glira - Fork Repository
- Python 3.10+ Update: Gemayel
- Based on: SQLMap (https://github.com/sqlmapproject/sqlmap)
- aron-bordin created the original Tyrant-SQL project (Python 2.7)
- glira maintains this fork repository
- Gemayel updated the code to Python 3.10+ and PySide6