Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Z4nzu
GitHub Repository: Z4nzu/hackingtool
Path: blob/master/tools/sql_injection.py
2371 views
1
from core import HackingTool, HackingToolsCollection, console
2
3
from rich.panel import Panel
4
from rich.prompt import Prompt
5
6
7
class Sqlmap(HackingTool):
8
TITLE = "Sqlmap tool"
9
DESCRIPTION = "sqlmap is an open source penetration testing tool that " \
10
"automates the process of detecting and exploiting SQL injection flaws " \
11
"and taking over database servers. [!] python3 sqlmap.py -u [http://example.com] --batch --banner. More usage: https://github.com/sqlmapproject/sqlmap/wiki/Usage"
12
INSTALL_COMMANDS = ["git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev"]
13
RUN_COMMANDS = ["cd sqlmap-dev;python3 sqlmap.py --wizard"]
14
PROJECT_URL = "https://github.com/sqlmapproject/sqlmap"
15
16
17
class NoSqlMap(HackingTool):
18
TITLE = "NoSqlMap"
19
DESCRIPTION = "NoSQLMap is an open source Python tool designed to audit and automate injection attacks. [*] Please install MongoDB."
20
INSTALL_COMMANDS = [
21
"git clone https://github.com/codingo/NoSQLMap.git",
22
# Bug 25 fix: was "python setup.py install" (Python 2) and "python NoSQLMap"
23
"cd NoSQLMap && pip install --user .",
24
]
25
# Bug 25 fix: "python" → "python3"
26
RUN_COMMANDS = ["python3 -m nosqlmap"]
27
PROJECT_URL = "https://github.com/codingo/NoSQLMap"
28
29
30
class SQLiScanner(HackingTool):
31
TITLE = "Damn Small SQLi Scanner"
32
DESCRIPTION = "DSSS is a fully functional SQL injection vulnerability scanner also supporting GET and POST parameters. Usage: python3 dsss.py -h | -u [URL]"
33
INSTALL_COMMANDS = ["git clone https://github.com/stamparm/DSSS.git"]
34
PROJECT_URL = "https://github.com/stamparm/DSSS"
35
36
def __init__(self):
37
super().__init__(runnable=False)
38
39
40
class Explo(HackingTool):
41
TITLE = "Explo"
42
DESCRIPTION = "Explo is a simple tool to describe web security issues in human and machine readable format. Usage: explo [--verbose|-v] testcase.yaml | explo [--verbose|-v] examples/*.yaml"
43
INSTALL_COMMANDS = [
44
"git clone https://github.com/dtag-dev-sec/explo.git",
45
"cd explo && pip install --user .",
46
]
47
PROJECT_URL = "https://github.com/dtag-dev-sec/explo"
48
49
def __init__(self):
50
super().__init__(runnable=False)
51
52
53
class Blisqy(HackingTool):
54
TITLE = "Blisqy - Exploit Time-based blind-SQL injection"
55
DESCRIPTION = "Blisqy helps web security researchers find time-based blind SQL injections on HTTP headers and exploit them."
56
INSTALL_COMMANDS = ["git clone https://github.com/JohnTroony/Blisqy.git"]
57
PROJECT_URL = "https://github.com/JohnTroony/Blisqy"
58
59
def __init__(self):
60
super().__init__(runnable=False)
61
62
63
class Leviathan(HackingTool):
64
TITLE = "Leviathan - Wide Range Mass Audit Toolkit"
65
DESCRIPTION = "Leviathan is a mass audit toolkit with service discovery, brute force, SQL injection detection, and custom exploit capabilities. Requires API keys."
66
INSTALL_COMMANDS = ["git clone https://github.com/leviathan-framework/leviathan.git",
67
"cd leviathan;pip install --user -r requirements.txt"]
68
RUN_COMMANDS = ["cd leviathan;python leviathan.py"]
69
PROJECT_URL = "https://github.com/leviathan-framework/leviathan"
70
71
72
class SQLScan(HackingTool):
73
TITLE = "SQLScan"
74
DESCRIPTION = "SQLScan is a quick web scanner to find SQL injection points. Not for educational purposes."
75
INSTALL_COMMANDS = ["sudo apt install php php-bz2 php-curl php-mbstring curl",
76
"sudo curl https://raw.githubusercontent.com/Cvar1984/sqlscan/dev/build/main.phar --output /usr/local/bin/sqlscan",
77
"chmod +x /usr/local/bin/sqlscan"]
78
RUN_COMMANDS = ["sudo sqlscan"]
79
PROJECT_URL = "https://github.com/Cvar1984/sqlscan"
80
81
82
class SqlInjectionTools(HackingToolsCollection):
83
TITLE = "SQL Injection Tools"
84
TOOLS = [Sqlmap(), NoSqlMap(), SQLiScanner(), Explo(), Blisqy(), Leviathan(), SQLScan()]
85
86
if __name__ == "__main__":
87
tools = SqlInjectionTools()
88
tools.show_options()
89
90