This tool is designed to test a given URL for SQL injection vulnerabilities. It uses a list of common SQL injection payloads to inject into the URL and checks if the response contains any SQL errors or vulnerabilities. The tool is intended for educational purposes and ethical security testing.
This tool is intended for educational purposes and ethical security testing only. Do not use it to attack websites without proper authorization. Unauthorized testing may violate local laws and could result in legal consequences. The author assumes no responsibility for any misuse or damage caused by this tool. Use responsibly and with proper authorization.
pip install requests
Run the tool by passing the target URL as an argument. Additional options are available for customization.
python app.py "http://example.com/vulnerable_page.php?id="
python app.py "http://example.com/vulnerable_page.php?id=" --timeout 10 --delay 1 --verbose
| Option | Description |
|—————–|—————————————————————————–|
| url
| The target URL to test for SQL injection vulnerabilities. |
| -t
, --timeout
| Request timeout in seconds (default: 5). |
| -d
, --delay
| Delay between requests in seconds (default: 0.5). |
| -v
, --verbose
| Enable verbose output for detailed debugging. |
python app.py "http://example.com/vulnerable_page.php?id="
2023-10-15 12:34:56,789 - INFO - Testing payload: ' OR 1=1--
2023-10-15 12:34:57,123 - WARNING - Vulnerable to SQL injection with payload: ' OR 1=1--
Continue testing? (y/n): y
2023-10-15 12:34:57,456 - INFO - Testing payload: ' OR '1'='1
2023-10-15 12:34:57,789 - INFO - No vulnerabilities detected.
"http://example.com/vulnerable_page.php?id="
with the actual URL you want to test.Contributions are welcome! If you would like to contribute to this repository, please follow these steps:
This project is licensed under the MIT License. See the LICENSE file for details.