Skip to main content

SQL tamper framework with context-aware transformations

Project description

SQL Tamper Framework

MySQL 5.7+ MariaDB 10.x Tests License Python 3.8+ GitHub stars

Context-aware SQL transformation framework for WAF bypass with proper safeguards.

Author: Regaan
License: GPL v2
Version: 2.1.0


Features

Token-Based Transformation

  • Full SQL lexer with UUID tracking
  • Multi-character operator support (>=, <=, <>, !=)
  • Context-aware transformations
  • String literal and comment preservation

AST-Based Transformation

  • Hierarchical SQL structure
  • Nested subquery handling
  • Depth-aware transformations
  • Function call detection

Safety Guarantees

  • Deterministic output (same input = same output)
  • Reapplication protection
  • SQL validity preservation
  • No random mutations

Installation

git clone https://github.com/noobforanonymous/sqlmap-tamper-collection.git
cd sqlmap-tamper-collection

# Copy tamper script to SQLMap
cp tamper_scripts/cloudflare2025.py /path/to/sqlmap/tamper/

# Or install framework for development
pip install -e .

Quick Start

With SQLMap

sqlmap -u "https://target.com?id=1" --tamper=cloudflare2025

Standalone Testing

cd tamper_scripts
python3 cloudflare2025.py

Tamper Script

cloudflare2025.py

Context-aware multi-layer WAF bypass.

Transformations:

  1. Keyword Wrapping - MySQL version comments

    SELECT -> /*!50000SELECT*/
    
  2. Space Replacement - Inline comments

    ' ' -> '/**/'
    
  3. Value Encoding - URL encoding (WHERE/HAVING only)

    >= -> %3E%3D
    
  4. Case Alternation - Alternating case

    SELECT -> sElEcT
    

Example:

Input:  SELECT * FROM users WHERE id>=5
Output: /*!50000sElEcT*//**/*/**//*!50000fRoM*//**/users/**//*!50000wHeRe*//**/id%3E%3D5

Critical Fixes:

  • Operators encoded correctly (>= becomes %3E%3D, not %3E=)
  • UUID tracking prevents position bugs
  • Context-aware (only encodes in WHERE/HAVING)
  • Deterministic output
  • String/comment preservation

Framework Architecture

Core Components

Lexer (tamper_framework/lexer.py)

  • Tokenizes SQL queries
  • UUID-based token tracking
  • Multi-char operator support

Context Tracker (tamper_framework/context.py)

  • Tracks SQL clause state
  • Knows WHERE vs SELECT vs FROM
  • Nesting depth tracking

Transformer (tamper_framework/transformer.py)

  • Context-aware transformations
  • Reapplication protection
  • Deterministic output

AST Builder (tamper_framework/ast_builder.py)

  • Hierarchical SQL structure
  • Subquery detection
  • Function call handling

Transformation Modules

Core Transformations:

  • keyword_wrap.py - MySQL version comment wrapping
  • space_replace.py - Space to /**/ replacement
  • case_alternate.py - Alternating case (sElEcT)
  • value_encode.py - Operator URL encoding

Advanced Transformations (v2.1.0+):

  • homoglyph.py - Unicode lookalike characters
  • function_wrap.py - IF()/CASE wrapping
  • numeric_obfuscation.py - Hex/float/math numbers
  • comment_chaos.py - Varied comment styles
  • logical_operator_swap.py - AND/OR to &&/||
  • hex_encode.py - String to hex encoding
  • version_comment_vary.py - Variable MySQL versions

WAF-Specific Tamper Scripts

WAF Script Key Techniques
Cloudflare cloudflare2025.py Version comments, case, space
AWS WAF v2 awswaf2026.py Hex encoding, &&/
Azure WAF azurewaf2026.py Hex strings, comment chaos
ModSecurity CRS modsec_crs2026.py Case first, math numbers
Imperva imperva2026.py Homoglyphs, function wrap
Akamai Kona akamai2026.py Float numbers, enterprise
Auto-Select meta_tamper.py Env-based chain combiner

Usage Examples

Basic Transformation

from tamper_framework.transformer import SQLTransformer
from tamper_framework.transformations import create_keyword_wrap_rule

transformer = SQLTransformer()
transformer.add_rule(create_keyword_wrap_rule())

result = transformer.transform("SELECT * FROM users")
# Result: /*!50000SELECT*/ * /*!50000FROM*/ users

Context-Aware Transformation

from tamper_framework.transformations import create_value_encode_rule

transformer = SQLTransformer()
transformer.add_rule(create_value_encode_rule())

# Only encodes in WHERE clause
result = transformer.transform("SELECT * FROM users WHERE id>=5")
# WHERE clause: id%3E%3D5
# SELECT clause: * (not encoded)

Custom Transformation

from tamper_framework.transformer import TransformationRule
from tamper_framework.lexer import Token, TokenType
from tamper_framework.context import SQLContext, ClauseType

def my_transform(token: Token, context: SQLContext) -> Token:
    if context.clause == ClauseType.WHERE:
        # Transform only in WHERE clause
        pass
    return token

rule = TransformationRule(
    name="my_rule",
    transform_func=my_transform,
    target_types=[TokenType.OPERATOR],
    allowed_clauses=[ClauseType.WHERE]
)

Testing

Run Tests

# All tests
python3 tests/test_lexer.py          # 10 tests
python3 tests/test_transformer.py    # 10 tests
python3 tests/test_integration.py    # 13 tests

# Total: 33/33 tests passing

Test Results

  • Lexer Tests: Multi-char operators, string literals, comments, UUID tracking
  • Transformer Tests: All transformations, context awareness, deterministic output
  • Integration Tests: Real SQLMap payloads, complex queries, edge cases

Documentation


Technical Details

Critical Fixes

1. Multi-Character Operator Support

Problem: Naive lexing breaks >= into > and =

# WRONG: '>=' -> '%3E' + '=' = '%3E=' (broken SQL)
# RIGHT: '>=' -> '%3E%3D' (complete encoding)

Solution: Check multi-char operators FIRST in lexer

2. UUID-Based Token Tracking

Problem: Position-based tracking breaks when token values change

# Token at position 10: "SELECT"
# After wrapping: "/*!50000SELECT*/"
# Position 10 is now invalid!

Solution: Each token gets a UUID that never changes

3. Context Awareness

Problem: Can't tell if operator is in SELECT or WHERE

SELECT * FROM users WHERE id=1
       ^                    ^
   (don't encode)      (encode this)

Solution: Track SQL clause state


Known Limitations

Current Scope

  1. MySQL/MariaDB Focus

    • Designed for MySQL syntax
    • May not work with PostgreSQL, MSSQL, Oracle
  2. Simplified Parsing

    • Not a full SQL parser
    • Complex nested queries may have edge cases
  3. WAF Dependent

    • Effectiveness varies by WAF configuration
    • No universal bypass guarantee

Edge Cases

Complex Nested Queries:

  • Deeply nested subqueries may fail
  • Workaround: Simplify query structure

Non-MySQL Databases:

  • Scripts designed for MySQL syntax
  • Workaround: Modify for target database

Performance

Token-Based vs AST-Based:

  • Token-based: Faster, simpler (use for most cases)
  • AST-based: More accurate, handles nesting (use for complex queries)

Benchmarks:

  • Simple query (10 tokens): ~1ms
  • Complex query (100 tokens): ~5ms
  • Nested subquery: ~10ms

Contributing

Contributions welcome! Please:

  1. Run all tests before submitting
  2. Document changes in code and docs
  3. Follow code style (see DEVELOPMENT.md)
  4. Test with real SQLMap if possible

Legal Disclaimer

⚠️ AUTHORIZED TESTING ONLY ⚠️

These transformations are deterministic and context-safe via the framework's lexer/AST—not for generating random malicious variants. Misuse voids any educational intent.

✅ Permitted Use:

  • Systems you own
  • With written authorization
  • Authorized penetration testing engagements
  • Bug bounty programs (within defined scope)
  • Local vulnerable app testing (DVWA, bWAPP, SQLi-labs)

❌ Prohibited Use:

  • Unauthorized systems
  • Illegal activities
  • Causing harm or damage
  • Violating terms of service
  • Production systems without explicit permission

Legal Frameworks: Unauthorized access to computer systems is illegal under:

  • Computer Fraud and Abuse Act (CFAA) - United States
  • Computer Misuse Act - United Kingdom
  • IT Act 2000, Section 66 - India
  • Similar laws in other jurisdictions

By using these tools, you agree to use them legally and responsibly.

The author (Regaan) is not responsible for misuse or damage caused by these tools.

Framework outputs are reproducible for research/verification; no built-in randomization to prevent abuse.

Maintained for authorized red team / bug bounty use. Report issues responsibly.


Support


Changelog

v2.1.0 - February 2026

  • New WAF Scripts: AWS WAF, Azure WAF, ModSecurity CRS, Imperva, Akamai
  • New Transformations: Homoglyphs, function wrap, numeric obfuscation, comment chaos, logical swap, hex encode, version vary
  • Meta Tamper: Auto-chain combiner with environment variable support
  • Examples Gallery: docs/EXAMPLES.md with 20+ scenarios
  • Backtick identifier support
  • CROSS/FULL JOIN support
  • Enhanced documentation

v2.0.0 - December 2025

  • Complete rewrite with token-based framework
  • UUID tracking for proper token management
  • Multi-character operator support
  • Context-aware transformations
  • AST builder for hierarchical structure
  • Comprehensive test suite (33+ tests)
  • Fixed operator encoding bug
  • Deterministic output
  • Reapplication protection

Built with engineering discipline, tested thoroughly, documented completely.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

sqlmap_tamper_framework-2.1.0.tar.gz (43.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

sqlmap_tamper_framework-2.1.0-py3-none-any.whl (34.5 kB view details)

Uploaded Python 3

File details

Details for the file sqlmap_tamper_framework-2.1.0.tar.gz.

File metadata

  • Download URL: sqlmap_tamper_framework-2.1.0.tar.gz
  • Upload date:
  • Size: 43.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for sqlmap_tamper_framework-2.1.0.tar.gz
Algorithm Hash digest
SHA256 e3b60c77cdabbb4040b749b81a5b4e87e44f4363be46682e197256b1e144a02e
MD5 dc8f6002a44e4362f7758d1444844dd0
BLAKE2b-256 2055941ef58d16f5baf469b907ecf2158762579f065dbbb52b13f173d7013da6

See more details on using hashes here.

Provenance

The following attestation bundles were made for sqlmap_tamper_framework-2.1.0.tar.gz:

Publisher: publish-pypi.yml on noobforanonymous/sqlmap-tamper-collection

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file sqlmap_tamper_framework-2.1.0-py3-none-any.whl.

File metadata

File hashes

Hashes for sqlmap_tamper_framework-2.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 dd27c99aa8a5efe7c216c163e5bbf930eb723ec58217e6baf2bbb738d75eb160
MD5 0a5406f9d5b86edec47c2d735b72a38b
BLAKE2b-256 0c7824380dbdc0db5125475ff3692c337495933fcc59f184cefea0dc51e066e5

See more details on using hashes here.

Provenance

The following attestation bundles were made for sqlmap_tamper_framework-2.1.0-py3-none-any.whl:

Publisher: publish-pypi.yml on noobforanonymous/sqlmap-tamper-collection

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page