@@ -104,6 +104,60 @@ sqlmap-ai -u "http://example.com/page.php?id=1"
104104sqlmap-ai -u " http://example.com/page.php?id=1" --ai-provider groq
105105```
106106
107+ ### HTTP Request File Testing (NEW!)
108+
109+ ``` bash
110+ # Test using HTTP request capture file
111+ sqlmap-ai -r request.txt
112+
113+ # Enhanced mode with request file and adaptive testing
114+ sqlmap-ai --enhanced --adaptive -r request.txt
115+
116+ # With specific AI provider
117+ sqlmap-ai --enhanced -r request.txt --ai-provider groq
118+
119+ # Simple mode with request file
120+ sqlmap-ai --simple -r request.txt
121+ ```
122+
123+ ** Request File Format:**
124+ ``` http
125+ POST /login.php HTTP/1.1
126+ Host: example.com
127+ User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
128+ Accept: text/html,application/xhtml+xml,application/xml;q=0.9
129+ Content-Type: application/x-www-form-urlencoded
130+ Content-Length: 38
131+
132+ username=admin&password=test
133+ ```
134+
135+ ** Creating Request Files:**
136+
137+ 1 . ** From Browser Developer Tools:**
138+ - Open Developer Tools (F12)
139+ - Go to Network tab
140+ - Perform the action you want to test
141+ - Right-click the request → Copy → Copy as cURL
142+ - Convert cURL to HTTP format
143+
144+ 2 . ** From Burp Suite:**
145+ - Intercept the request
146+ - Right-click → Save item
147+ - Save as .txt file
148+
149+ 3 . ** From OWASP ZAP:**
150+ - Right-click request → Export → HTTP Message
151+ - Save as .txt file
152+
153+ ** Supported Request Types:**
154+ - [x] GET requests with parameters
155+ - [x] POST requests with form data
156+ - [x] POST requests with JSON data
157+ - [x] Requests with cookies
158+ - [x] Requests with custom headers
159+ - [x] Multipart form data
160+
107161### Advanced Testing
108162
109163``` bash
@@ -112,6 +166,9 @@ sqlmap-ai --adaptive
112166
113167# Simple mode (basic SQLMap without AI)
114168sqlmap-ai --simple -u " http://example.com/page.php?id=1"
169+
170+ # Enhanced mode with custom options
171+ sqlmap-ai --enhanced -u " http://example.com/page.php?id=1" --level 3 --risk 2
115172```
116173
117174### AI Provider Selection
@@ -130,6 +187,90 @@ sqlmap-ai -u "http://example.com/page.php?id=1" --ai-provider openai
130187sqlmap-ai -u " http://example.com/page.php?id=1" --ai-provider auto
131188```
132189
190+ ### Complete Testing Workflow
191+
192+ ``` bash
193+ # 1. Basic scan with URL
194+ sqlmap-ai -u " http://example.com/page.php?id=1"
195+
196+ # 2. Enhanced scan with request file
197+ sqlmap-ai --enhanced --adaptive -r captured_request.txt
198+
199+ # 3. Advanced scan with custom options
200+ sqlmap-ai --enhanced -r request.txt --level 4 --risk 3 --threads 10
201+
202+ # 4. Simple mode for quick testing
203+ sqlmap-ai --simple -r request.txt --batch
204+ ```
205+
206+ ## Testing Modes
207+
208+ ### Enhanced Mode (Default)
209+ Full AI-powered testing with advanced features:
210+
211+ ``` bash
212+ # Basic enhanced scan
213+ sqlmap-ai --enhanced -u " http://example.com/page.php?id=1"
214+
215+ # With request file
216+ sqlmap-ai --enhanced -r request.txt
217+
218+ # Adaptive testing with AI analysis
219+ sqlmap-ai --enhanced --adaptive -r request.txt --ai-provider groq
220+ ```
221+
222+ ** Features:**
223+ - AI-powered vulnerability analysis
224+ - Adaptive testing strategies
225+ - WAF evasion techniques
226+ - Beautiful HTML reports
227+ - Risk assessment and remediation guidance
228+ - Interactive CLI with progress tracking
229+ - Multiple AI providers (Groq, OpenAI, Anthropic, Ollama)
230+ - Advanced configuration management
231+ - Request file support (NEW!)
232+
233+ ### Simple Mode
234+ Basic SQL injection testing without AI features:
235+
236+ ``` bash
237+ # Basic simple scan
238+ sqlmap-ai --simple -u " http://example.com/page.php?id=1"
239+
240+ # With request file
241+ sqlmap-ai --simple -r request.txt
242+
243+ # Quick batch mode
244+ sqlmap-ai --simple -r request.txt --batch
245+ ```
246+
247+ ** Features:**
248+ - Basic SQL injection detection
249+ - Standard SQLMap functionality
250+ - Minimal dependencies
251+ - Fast execution
252+ - Request file support (NEW!)
253+ - Simple text output
254+ - Basic result saving
255+
256+ ### Adaptive Mode
257+ Intelligent step-by-step testing that adapts to the target:
258+
259+ ``` bash
260+ # Full adaptive testing
261+ sqlmap-ai --enhanced --adaptive -r request.txt
262+
263+ # With specific AI provider
264+ sqlmap-ai --enhanced --adaptive -r request.txt --ai-provider groq
265+ ```
266+
267+ ** Adaptive Steps:**
268+ 1 . ** 🟢 Initial Assessment** - Check for SQL injection vulnerabilities
269+ 2 . ** 🟠 DBMS Identification** - Detect database type (MySQL, PostgreSQL, etc.)
270+ 3 . ** 🔴 Enhanced Testing** - Try more aggressive techniques
271+ 4 . ** 🟣 Data Extraction** - Extract valuable data from identified tables
272+ 5 . ** 🤖 AI Analysis** - Get AI recommendations for next steps
273+
133274## AI Providers Comparison
134275
135276| Provider | Setup | Speed | Privacy | Cost |
203344- Run `sqlmap-ai --config-wizard` to fix setup
204345- Check `sqlmap-ai --validate-config` for issues
205346
347+ **5. "Request file not working"**
348+ - Ensure request file has proper HTTP format
349+ - Check that Host header is present
350+ - Verify request file path is correct
351+ - Try with `--simple` mode first : ` sqlmap-ai --simple -r request.txt`
352+
353+ **6. "URL validation failed"**
354+ - When using request files, the URL is automatically extracted
355+ - Ensure request file contains valid HTTP request
356+ - Check that the Host header matches the target domain
357+
206358# ## Getting Help
207359
208360` ` ` bash
0 commit comments