Skip to content

SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for common SQLi patterns. It supports integration with proxychains for enhanced anonymity and security during network requests.

License

Notifications You must be signed in to change notification settings

Acorzo1983/SQLiHunter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

21 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SQLiHunter

SQLiHunter is a tool designed to identify SQL Injection (SQLi) vulnerabilities in web applications by utilizing the Wayback Machine to fetch URLs from domains and subdomains. This tool automates the collection of URLs from the Wayback Machine, filters them, cleans them, and generates a sqlmap command for analysis.


Features

  • Fetches URLs from the Wayback Machine for a domain or list of domains.
  • Filters URLs to find potential SQL injection points (URLs with query parameters).
  • Generates sqlmap commands to test the identified URLs.
  • Supports processing single domains or lists of domains.
  • Saves raw and processed URLs in output files.

Requirements

  • Python 3
  • cURL

Dependencies

The script uses the following Python libraries:

  • colorama for console colorization.
  • argparse for command-line argument handling.
  • subprocess to interact with cURL and execute system commands.

Install dependencies using pip:

pip install colorama

Installation Run this one-liner to install SQLiHunter globally:

git clone https://github.com/Acorzo1983/SQLiHunter.git && cd SQLiHunter && chmod +x sqlihunter.py && sudo ln -s $(pwd)/sqlihunter.py /usr/local/bin/sqlihunter

This will:

  • Clone the repository.
  • Make the script executable.
  • Create a symbolic link to run sqlihunter from any directory.

Usage

Scanning a Single Domain

sqlihunter -d example.com

This will:

  • Fetch URLs for example.com from the Wayback Machine.
  • Filter URLs with query parameters.
  • Save raw/cleaned URLs to the output directory.

Generate a sqlmap command for testing.

Scanning Multiple Domains Create a text file (e.g., domains.txt) and run:

sqlihunter -l domains.txt

This will:

  • Fetch URLs for all domains in the list.
  • Save raw/cleaned URLs in separate files per domain.
  • Generate a combined sqlmap command for all domains.

Arguments

Argument Description

-d, --domain	Specify a single domain to scan.
-l, --list	Specify a text file containing a list of domains.
-o, --output	Set the output directory (default: ./output).

Contributing

Feel free to contribute to this project! Open an issue or submit a pull request.

License

This project is licensed under the MIT License. See the LICENSE file for details.

Made with ❤️ by Albert C.

About

SQLi Hunter is a tool designed to find potential SQL injection vulnerabilities by fetching URLs from the Wayback Machine and checking for common SQLi patterns. It supports integration with proxychains for enhanced anonymity and security during network requests.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages