A simple Python script to scan multiple targets for SQL Injection via HTTP headers like User-Agent, X-Forwarded-For, and X-Client-IP.
The scanner detects time-based blind SQLi vulnerabilities by measuring response delays when a SLEEP() payload is injected.
- Supports Discord webhook for instant alerts
- Shuffles the list of URLs before scanning, so every scan is random and stealthier.
- Randomizes GET, POST, PUT, OPTIONS, HEAD, PATCH method order per target.
- Randomizes header fuzzing order (User-Agent, X-Forwarded-For, X-Client-IP).
- Sends the SQLi payload into only one header per request (others stay clean).
- Saves each request into Burp-ready .txt files inside a requests_TIMESTAMP/ folder.