Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
This repository was archived by the owner on Oct 30, 2018. It is now read-only.
/sqlivPublic archive

massive SQL injection vulnerability scanner

License

NotificationsYou must be signed in to change notification settings

the-robot/sqliv

Repository files navigation

Massive SQL injection scanner

Features

  1. multiple domain scanning with SQL injection dork by Bing, Google, or Yahoo
  2. targetted scanning by providing specific domain (with crawling)
  3. reverse domain scanning

both SQLi scanning and domain info checking are done in multiprocessing
so the script is super fast at scanning many urls

quick tutorial & screenshots are shown at the bottom
project contribution tips at the bottom


Installation

  1. git clonehttps://github.com/the-robot/sqliv.git
  2. sudo python2 setup.py -i

Dependencies

Pre-installed Systems


Quick Tutorial

1. Multiple domain scanning with SQLi dork

  • it simply search multiple websites from given dork and scan the results one by one
pythonsqliv.py-d<SQLIDORK>-e<SEARCHENGINE>pythonsqliv.py-d"inurl:index.php?id="-egoogle

2. Targetted scanning

  • can provide only domain name or specifc url with query params
  • if only domain name is provided, it will crawl and get urls with query
  • then scan the urls one by one
pythonsqliv.py-t<URL>pythonsqliv.py-twww.example.compythonsqliv.py-twww.example.com/index.php?id=1

3. Reverse domain and scanning

  • do reverse domain and look for websites that hosted on same server as target url
pythonsqliv.py-t<URL>-r

4. Dumping scanned result

  • you can dump the scanned results as json by giving this argument
pythonsqliv.py-d<SQLIDORK>-e<SEARCHENGINE>-oresult.json

View help

pythonsqliv.py--helpusage:sqliv.py [-h] [-dD] [-eE] [-pP] [-tT] [-r]optionalarguments:-h,--helpshowthishelpmessageandexit-dDSQLinjectiondork-eEsearchengine [Googleonlyfornow]-pPnumberofwebsitestolookforinsearchengine-tTscantargetwebsite-rreversedomain

screenshots

1234


Development

TODO

  1. POST form SQLi vulnerability testing

[8]ページ先頭

©2009-2025 Movatter.jp