mirror of
https://github.com/atiilla/sqlmap-ai.git
synced 2026-04-27 00:25:52 +03:00
[GH-ISSUE #12] Not Getting Results Even with Testphp.txt? #10
Labels
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/sqlmap-ai#10
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @taylorhawksec on GitHub (Feb 2, 2026).
Original GitHub issue: https://github.com/atiilla/sqlmap-ai/issues/12
Still not getting results even with the testphp.txt?
Got any advice? Is it recommended to run in venv?
Let me know, thanks!
@atiilla commented on GitHub (Feb 7, 2026):
try again with new version
@taylorhawksec commented on GitHub (Feb 7, 2026):
PS C:\Users\thawk> sqlmap-ai.exe -r .\sqlmap-ai\testphp.txt --enhanced --adaptive
Starting SQLMap AI in ENHANCED mode (AI-Powered Mode)...
This mode includes AI-powered analysis, adaptive testing, and advanced features.
▄▀▀▀▄ v2.0.8
█░░░█ https://github.com/atiilla/sqlmap-ai
█░░░█ AI-Powered SQL Injection Testing
▀█░█▀
▀
[INFO] Starting SQLMap API server...
[INFO] Using timeout of 120 seconds
[INFO] Available AI providers: groq, ollama
INFO:SQLMapAI_Audit:SECURITY_EVENT: {"timestamp": "2026-02-07T16:11:06.737026", "event_type": "SCAN_START", "severity": "INFO", "details": {"target_url": "http://testphp.vulnweb.com/artists.php?artist=2", "options": ["--batch", "-r", ".\sqlmap-ai\testphp.txt", "--risk=1", "--level=1", "--threads=5"], "option_count": 6}, "user_context": null}
[INFO] Starting enhanced adaptive testing sequence...
[INFO] This mode integrates AI analysis and advanced evasion techniques
[INFO] � Step 1: Initial Target Assessment
[INFO] Objective: Check if target is vulnerable to SQL injection
[INFO] Running initial assessment with --batch --dbs --threads=5
[INFO] Scanning target...
[INFO] Scan started for task ID: ae3ccbc56fa0f282
[INFO] Starting SQLMap scan...
[INFO] Runnin
Scan completed
[INFO] Task ae3ccbc56fa0f282 deleted successfully
[*] No vulnerabilities detected
[SUCCESS] SQLMap execution completed
[WARNING] No databases found in initial scan. Moving to DBMS identification.
[INFO] � Step 2: Identify the Database Management System (DBMS)
[INFO] Objective: Identify the DBMS type for targeted attack strategy
[INFO] Running DBMS fingerprinting with --batch --fingerprint --threads=5
[INFO] Scanning target...
[INFO] Scan started for task ID: 4e1fb5079467fc59
[INFO] Starting SQLMap scan...
[INFO] Runnin
Scan completed
[INFO] Task 4e1fb5079467fc59 deleted successfully
[*] No vulnerabilities detected
[SUCCESS] SQLMap execution completed
[WARNING] Could not identify specific DBMS. Moving to enhanced testing.
[INFO] � Step 4: Enhanced Testing
[INFO] Objective: Try more aggressive techniques to bypass protections
[INFO] Checking for Web Application Firewall (WAF)...
[INFO] Scanning target...
[INFO] Scan started for task ID: 4801c1f558b50a4f
[INFO] Starting SQLMap scan...
[INFO] Runnin
Scan completed
[INFO] Task 4801c1f558b50a4f deleted successfully
[*] No vulnerabilities detected
[SUCCESS] SQLMap execution completed
[INFO] Scanning target...
[INFO] Scan started for task ID: d900cce6ddf34685
[INFO] Starting SQLMap scan...
[INFO] Runnin
Scan completed
[INFO] Task d900cce6ddf34685 deleted successfully
[*] No vulnerabilities detected
[SUCCESS] SQLMap execution completed
[INFO] Trying with increased risk and level settings...
[INFO] Scanning target...
[INFO] Scan started for task ID: 1249ce764023074e
[INFO] Starting SQLMap scan...
[INFO] Runnin
Scan completed
[INFO] Task 1249ce764023074e deleted successfully
[*] No vulnerabilities detected
[SUCCESS] SQLMap execution completed
[INFO] Enhancing results with AI analysis...
[INFO] Creating beautiful HTML report...
[SUCCESS] Beautiful HTML report generated: reports\sqlmap_report_1770502271.html
[INFO] Open the HTML file in your browser to view the interactive report
INFO:SQLMapAI_Audit:SECURITY_EVENT: {"timestamp": "2026-02-07T16:11:11.890324", "event_type": "SCAN_COMPLETE", "severity": "INFO", "details": {"target_url": "http://testphp.vulnweb.com/artists.php?artist=2", "vulnerabilities_found": 0}, "user_context": null}
@atiilla commented on GitHub (Feb 7, 2026):
https://github.com/user-attachments/assets/3dd7f871-3f80-4bd0-8428-d5bfa5a6154f
@taylorhawksec commented on GitHub (Feb 8, 2026):
Okay first one worked fine now, but now if i run it again or on different targets I don't get any results
@atiilla commented on GitHub (Feb 8, 2026):
https://github.com/user-attachments/assets/2f426bdb-53f5-4bf0-99ba-88b3d2d574cb