[GH-ISSUE #12] Not Getting Results Even with Testphp.txt? #10

Closed
opened 2026-03-01 14:51:14 +03:00 by kerem · 5 comments
Owner

Originally created by @taylorhawksec on GitHub (Feb 2, 2026).
Original GitHub issue: https://github.com/atiilla/sqlmap-ai/issues/12

Image

Still not getting results even with the testphp.txt?

Got any advice? Is it recommended to run in venv?

Let me know, thanks!

Originally created by @taylorhawksec on GitHub (Feb 2, 2026). Original GitHub issue: https://github.com/atiilla/sqlmap-ai/issues/12 <img width="1324" height="349" alt="Image" src="https://github.com/user-attachments/assets/1bb453f5-ecdf-481b-b354-b8d5d97c4fa3" /> Still not getting results even with the testphp.txt? Got any advice? Is it recommended to run in venv? Let me know, thanks!
kerem closed this issue 2026-03-01 14:51:14 +03:00
Author
Owner

@atiilla commented on GitHub (Feb 7, 2026):

try again with new version

pip install sqlmap-ai
<!-- gh-comment-id:3865493733 --> @atiilla commented on GitHub (Feb 7, 2026): try again with new version ``` pip install sqlmap-ai ```
Author
Owner

@taylorhawksec commented on GitHub (Feb 7, 2026):

PS C:\Users\thawk> sqlmap-ai.exe -r .\sqlmap-ai\testphp.txt --enhanced --adaptive
Starting SQLMap AI in ENHANCED mode (AI-Powered Mode)...
This mode includes AI-powered analysis, adaptive testing, and advanced features.

▄▀▀▀▄ v2.0.8
█░░░█ https://github.com/atiilla/sqlmap-ai
█░░░█ AI-Powered SQL Injection Testing
▀█░█▀

[INFO] Starting SQLMap API server...
[INFO] Using timeout of 120 seconds
[INFO] Available AI providers: groq, ollama
INFO:SQLMapAI_Audit:SECURITY_EVENT: {"timestamp": "2026-02-07T16:11:06.737026", "event_type": "SCAN_START", "severity": "INFO", "details": {"target_url": "http://testphp.vulnweb.com/artists.php?artist=2", "options": ["--batch", "-r", ".\sqlmap-ai\testphp.txt", "--risk=1", "--level=1", "--threads=5"], "option_count": 6}, "user_context": null}
[INFO] Starting enhanced adaptive testing sequence...
[INFO] This mode integrates AI analysis and advanced evasion techniques
[INFO] � Step 1: Initial Target Assessment
[INFO] Objective: Check if target is vulnerable to SQL injection
[INFO] Running initial assessment with --batch --dbs --threads=5
[INFO] Scanning target...
[INFO] Scan started for task ID: ae3ccbc56fa0f282
[INFO] Starting SQLMap scan...
[INFO] Runnin
Scan completed

[INFO] Task ae3ccbc56fa0f282 deleted successfully
[*] No vulnerabilities detected

[SUCCESS] SQLMap execution completed
[WARNING] No databases found in initial scan. Moving to DBMS identification.
[INFO] � Step 2: Identify the Database Management System (DBMS)
[INFO] Objective: Identify the DBMS type for targeted attack strategy
[INFO] Running DBMS fingerprinting with --batch --fingerprint --threads=5
[INFO] Scanning target...
[INFO] Scan started for task ID: 4e1fb5079467fc59
[INFO] Starting SQLMap scan...
[INFO] Runnin
Scan completed

[INFO] Task 4e1fb5079467fc59 deleted successfully
[*] No vulnerabilities detected

[SUCCESS] SQLMap execution completed
[WARNING] Could not identify specific DBMS. Moving to enhanced testing.
[INFO] � Step 4: Enhanced Testing
[INFO] Objective: Try more aggressive techniques to bypass protections
[INFO] Checking for Web Application Firewall (WAF)...
[INFO] Scanning target...
[INFO] Scan started for task ID: 4801c1f558b50a4f
[INFO] Starting SQLMap scan...
[INFO] Runnin
Scan completed

[INFO] Task 4801c1f558b50a4f deleted successfully
[*] No vulnerabilities detected

[SUCCESS] SQLMap execution completed
[INFO] Scanning target...
[INFO] Scan started for task ID: d900cce6ddf34685
[INFO] Starting SQLMap scan...
[INFO] Runnin
Scan completed

[INFO] Task d900cce6ddf34685 deleted successfully
[*] No vulnerabilities detected

[SUCCESS] SQLMap execution completed
[INFO] Trying with increased risk and level settings...
[INFO] Scanning target...
[INFO] Scan started for task ID: 1249ce764023074e
[INFO] Starting SQLMap scan...
[INFO] Runnin
Scan completed

[INFO] Task 1249ce764023074e deleted successfully
[*] No vulnerabilities detected

[SUCCESS] SQLMap execution completed
[INFO] Enhancing results with AI analysis...
[INFO] Creating beautiful HTML report...
[SUCCESS] Beautiful HTML report generated: reports\sqlmap_report_1770502271.html
[INFO] Open the HTML file in your browser to view the interactive report
INFO:SQLMapAI_Audit:SECURITY_EVENT: {"timestamp": "2026-02-07T16:11:11.890324", "event_type": "SCAN_COMPLETE", "severity": "INFO", "details": {"target_url": "http://testphp.vulnweb.com/artists.php?artist=2", "vulnerabilities_found": 0}, "user_context": null}

<!-- gh-comment-id:3865620498 --> @taylorhawksec commented on GitHub (Feb 7, 2026): PS C:\Users\thawk> sqlmap-ai.exe -r .\sqlmap-ai\testphp.txt --enhanced --adaptive Starting SQLMap AI in ENHANCED mode (AI-Powered Mode)... This mode includes AI-powered analysis, adaptive testing, and advanced features. ▄▀▀▀▄ v2.0.8 █░░░█ https://github.com/atiilla/sqlmap-ai █░░░█ AI-Powered SQL Injection Testing ▀█░█▀ ▀ [INFO] Starting SQLMap API server... [INFO] Using timeout of 120 seconds [INFO] Available AI providers: groq, ollama INFO:SQLMapAI_Audit:SECURITY_EVENT: {"timestamp": "2026-02-07T16:11:06.737026", "event_type": "SCAN_START", "severity": "INFO", "details": {"target_url": "http://testphp.vulnweb.com/artists.php?artist=2", "options": ["--batch", "-r", ".\\sqlmap-ai\\testphp.txt", "--risk=1", "--level=1", "--threads=5"], "option_count": 6}, "user_context": null} [INFO] Starting enhanced adaptive testing sequence... [INFO] This mode integrates AI analysis and advanced evasion techniques [INFO] � Step 1: Initial Target Assessment [INFO] Objective: Check if target is vulnerable to SQL injection [INFO] Running initial assessment with --batch --dbs --threads=5 [INFO] Scanning target... [INFO] Scan started for task ID: ae3ccbc56fa0f282 [INFO] Starting SQLMap scan... [INFO] Runnin Scan completed [INFO] Task ae3ccbc56fa0f282 deleted successfully [*] No vulnerabilities detected [SUCCESS] SQLMap execution completed [WARNING] No databases found in initial scan. Moving to DBMS identification. [INFO] � Step 2: Identify the Database Management System (DBMS) [INFO] Objective: Identify the DBMS type for targeted attack strategy [INFO] Running DBMS fingerprinting with --batch --fingerprint --threads=5 [INFO] Scanning target... [INFO] Scan started for task ID: 4e1fb5079467fc59 [INFO] Starting SQLMap scan... [INFO] Runnin Scan completed [INFO] Task 4e1fb5079467fc59 deleted successfully [*] No vulnerabilities detected [SUCCESS] SQLMap execution completed [WARNING] Could not identify specific DBMS. Moving to enhanced testing. [INFO] � Step 4: Enhanced Testing [INFO] Objective: Try more aggressive techniques to bypass protections [INFO] Checking for Web Application Firewall (WAF)... [INFO] Scanning target... [INFO] Scan started for task ID: 4801c1f558b50a4f [INFO] Starting SQLMap scan... [INFO] Runnin Scan completed [INFO] Task 4801c1f558b50a4f deleted successfully [*] No vulnerabilities detected [SUCCESS] SQLMap execution completed [INFO] Scanning target... [INFO] Scan started for task ID: d900cce6ddf34685 [INFO] Starting SQLMap scan... [INFO] Runnin Scan completed [INFO] Task d900cce6ddf34685 deleted successfully [*] No vulnerabilities detected [SUCCESS] SQLMap execution completed [INFO] Trying with increased risk and level settings... [INFO] Scanning target... [INFO] Scan started for task ID: 1249ce764023074e [INFO] Starting SQLMap scan... [INFO] Runnin Scan completed [INFO] Task 1249ce764023074e deleted successfully [*] No vulnerabilities detected [SUCCESS] SQLMap execution completed [INFO] Enhancing results with AI analysis... [INFO] Creating beautiful HTML report... [SUCCESS] Beautiful HTML report generated: reports\sqlmap_report_1770502271.html [INFO] Open the HTML file in your browser to view the interactive report INFO:SQLMapAI_Audit:SECURITY_EVENT: {"timestamp": "2026-02-07T16:11:11.890324", "event_type": "SCAN_COMPLETE", "severity": "INFO", "details": {"target_url": "http://testphp.vulnweb.com/artists.php?artist=2", "vulnerabilities_found": 0}, "user_context": null}
Author
Owner
<!-- gh-comment-id:3865719424 --> @atiilla commented on GitHub (Feb 7, 2026): https://github.com/user-attachments/assets/3dd7f871-3f80-4bd0-8428-d5bfa5a6154f
Author
Owner

@taylorhawksec commented on GitHub (Feb 8, 2026):

Okay first one worked fine now, but now if i run it again or on different targets I don't get any results

<!-- gh-comment-id:3865798941 --> @taylorhawksec commented on GitHub (Feb 8, 2026): Okay first one worked fine now, but now if i run it again or on different targets I don't get any results
Author
Owner
<!-- gh-comment-id:3865869941 --> @atiilla commented on GitHub (Feb 8, 2026): https://github.com/user-attachments/assets/2f426bdb-53f5-4bf0-99ba-88b3d2d574cb
Sign in to join this conversation.
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/sqlmap-ai#10
No description provided.