____ ___ _ ____ _ _ _
/ ___| / _ \| | / ___|| | ___ _ _| |_| |__
\___ \| | | | | \___ \| |/ _ \ | | | __| '_ \
___) | |_| | |___ ___) | | __/ |_| | |_| | | |
|____/ \__\_\_____|____/|_|\___|\__,_|\__|_| |_|
π SQL Sleuth - Advanced SQL Injection Scanner π
SQLSleuth is a next-gen SQL Injection detection tool built in Python for penetration testers, bug bounty hunters, and security researchers. It combines stealth techniques with multi-threaded scanning to uncover vulnerabilities quickly.
π‘ Think of it as your lightweight, customizable version of a SQLi framework.
- β Error-Based SQL Injection Detection
- β Boolean-Based Blind SQL Injection Detection
- β Multi-Threaded Payload Testing
- β User-Agent Randomization
- β Custom Payload Support
- β Header & Cookie Injection
- β Logging to scan_results.txt
- β Experimental DB Extraction Mode
- β Stylish ASCII Banner UI
This tool is for educational purposes and authorized testing only. The author takes no responsibility for misuse. Use it only on targets you have permission to test.
git clone https://github.com/YourUsername/SQLSleuth.git
cd SQLSleuth
pip install -r requirements.txt
python3 sqli_sleuth.py -u "http://target.com/page.php?id=1"
python3 sqli_sleuth.py -u "http://target.com/page.php?id=1" -p "custom_payloads.txt"
python3 sqli_sleuth.py -u "http://target.com/login.php" -d "username=admin&password=INJECT"
python3 sqli_sleuth.py -u "http://target.com/page.php?id=1" -c "PHPSESSID=abc123; security=low"
python3 sqli_sleuth.py -u "http://target.com/page.php?id=1" --header "User-Agent: CustomAgent"
python3 sqli_sleuth.py -u "http://testphp.vulnweb.com/listproducts.php?cat=1" --dump
SQLSleuth/
βββ sqli_sleuth.py # Main Scanner Script
βββ payloads.txt # Default Payloads
βββ requirements.txt # Dependencies
βββ README.md # This Legendary Readme
βββ .gitignore # Ignores logs and local files
-
Loads payloads from
payloads.txt
-
Sends crafted requests to the target
-
Detects anomalies:
- Error-based SQLi
- Boolean-based blind SQLi
-
If
--dump
is enabled, attempts database name extraction -
Logs results in
scan_results.txt
[i] Testing http://target.com/page.php?id=1 for SQL errors (GET)...
[+] Vulnerable! SQL error triggered with payload: '
[*] Dump mode enabled! Attempting to extract DB name...
[DUMP] Database Name: acuart
- DBMS Fingerprinting (MySQL, MSSQL, Oracle, PostgreSQL)
- Table & Column Enumeration
- Proxy & Tor Support
- Interactive Exploitation Console
- Full Data Extraction Module
Released under the MIT License β free to use, modify, and share (with attribution).
- Star β the repository if you like it
- Share with other security researchers
- Contribute payloads or new features via pull requests
ObliviousK0t β Security Researcher & Pentester Follow for more open-source security tools.