Skip to content

ifconfig-me/SQLi-Scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

A simple Python script to scan multiple targets for SQL Injection via HTTP headers like User-Agent, X-Forwarded-For, and X-Client-IP.

The scanner detects time-based blind SQLi vulnerabilities by measuring response delays when a SLEEP() payload is injected.

Features:

  • Supports Discord webhook for instant alerts
  • Shuffles the list of URLs before scanning, so every scan is random and stealthier.
  • Randomizes GET, POST, PUT, OPTIONS, HEAD, PATCH method order per target.
  • Randomizes header fuzzing order (User-Agent, X-Forwarded-For, X-Client-IP).
  • Sends the SQLi payload into only one header per request (others stay clean).
  • Saves each request into Burp-ready .txt files inside a requests_TIMESTAMP/ folder.

image

image

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages