Skip to content

A lightweight yet powerful SQL Injection scanner with multi-threading, modular payloads, user-agent randomization, and experimental DB extraction mode. πŸ”

License

Notifications You must be signed in to change notification settings

ObliviousK0t/SQLSleuth

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

6 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ”₯ SQLSleuth – SQL Injection Scanner

                                       ____   ___  _     ____  _            _   _     
                                      / ___| / _ \| |   / ___|| | ___ _   _| |_| |__  
                                      \___ \| | | | |   \___ \| |/ _ \ | | | __| '_ \ 
                                       ___) | |_| | |___ ___) | |  __/ |_| | |_| | | |
                                      |____/ \__\_\_____|____/|_|\___|\__,_|\__|_| |_|
                                                 
                                    πŸ”  SQL Sleuth - Advanced SQL Injection Scanner  πŸ”

πŸ•΅οΈβ€β™‚οΈ What is SQLSleuth?

SQLSleuth is a next-gen SQL Injection detection tool built in Python for penetration testers, bug bounty hunters, and security researchers. It combines stealth techniques with multi-threaded scanning to uncover vulnerabilities quickly.

πŸ’‘ Think of it as your lightweight, customizable version of a SQLi framework.


πŸš€ Features

  • βœ… Error-Based SQL Injection Detection
  • βœ… Boolean-Based Blind SQL Injection Detection
  • βœ… Multi-Threaded Payload Testing
  • βœ… User-Agent Randomization
  • βœ… Custom Payload Support
  • βœ… Header & Cookie Injection
  • βœ… Logging to scan_results.txt
  • βœ… Experimental DB Extraction Mode
  • βœ… Stylish ASCII Banner UI

⚠️ Disclaimer

This tool is for educational purposes and authorized testing only. The author takes no responsibility for misuse. Use it only on targets you have permission to test.


πŸ› οΈ Installation

git clone https://github.com/YourUsername/SQLSleuth.git
cd SQLSleuth
pip install -r requirements.txt

▢️ Usage Examples

πŸ”Ή Basic Scan

python3 sqli_sleuth.py -u "http://target.com/page.php?id=1"

πŸ”Ή Using Custom Payloads

python3 sqli_sleuth.py -u "http://target.com/page.php?id=1" -p "custom_payloads.txt"

πŸ”Ή Testing POST Parameters

python3 sqli_sleuth.py -u "http://target.com/login.php" -d "username=admin&password=INJECT"

πŸ”Ή With Cookies

python3 sqli_sleuth.py -u "http://target.com/page.php?id=1" -c "PHPSESSID=abc123; security=low"

πŸ”Ή Custom Headers

python3 sqli_sleuth.py -u "http://target.com/page.php?id=1" --header "User-Agent: CustomAgent"

πŸ”Ή Dump Mode (Experimental)

python3 sqli_sleuth.py -u "http://testphp.vulnweb.com/listproducts.php?cat=1" --dump

πŸ“‚ Project Structure

SQLSleuth/
β”œβ”€β”€ sqli_sleuth.py       # Main Scanner Script
β”œβ”€β”€ payloads.txt         # Default Payloads
β”œβ”€β”€ requirements.txt     # Dependencies
β”œβ”€β”€ README.md            # This Legendary Readme
└── .gitignore           # Ignores logs and local files

🧩 How It Works

  1. Loads payloads from payloads.txt

  2. Sends crafted requests to the target

  3. Detects anomalies:

    • Error-based SQLi
    • Boolean-based blind SQLi
  4. If --dump is enabled, attempts database name extraction

  5. Logs results in scan_results.txt


πŸ“Œ Example Output

[i] Testing http://target.com/page.php?id=1 for SQL errors (GET)...
[+] Vulnerable! SQL error triggered with payload: '
[*] Dump mode enabled! Attempting to extract DB name...
[DUMP] Database Name: acuart

βœ… Future Roadmap

  • DBMS Fingerprinting (MySQL, MSSQL, Oracle, PostgreSQL)
  • Table & Column Enumeration
  • Proxy & Tor Support
  • Interactive Exploitation Console
  • Full Data Extraction Module

πŸ“œ License

Released under the MIT License – free to use, modify, and share (with attribution).


⭐ Support the Project

  • Star ⭐ the repository if you like it
  • Share with other security researchers
  • Contribute payloads or new features via pull requests

πŸ‘¨β€πŸ’» Author

ObliviousK0t – Security Researcher & Pentester Follow for more open-source security tools.


🎯 Hack Responsibly. Scan Smart. Stay Sleuthy.

About

A lightweight yet powerful SQL Injection scanner with multi-threading, modular payloads, user-agent randomization, and experimental DB extraction mode. πŸ”

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages