Skip to content

Python script to fuzz for SQL injection vulnerabilities in URL and input parameters

License

Notifications You must be signed in to change notification settings

sapphicart/sqli-fuzzer

Repository files navigation

SQLi Fuzzer

SummaryRequirementsInstallationUsageTo DoLicense

Summary

SQLi Fuzzer is a tool made for personal use. This tool fuzzes for URL or input parameters vulnerable to SQL Injections. The file url_fuzz.txt currently contains basic ORDER BY SQL queries passed in URL parameter. The default wordlist includes SQL queries in plaintext, url encoding and hex encoding.

Warning: The tool is currently under development. I cannot gurantee successful utilisation.

Requirements

  • Python 3.xx

Installation

There are two ways to install sqlifuzzer:

Install the tool directly with pip

pip install sqlifuzzer

Or, you can build from source. Download the latest release.

Usage

Use the --help switch to read the OPTIONS available.

$ sqlifuzzer --help
Usage: sqlifuzzer.py [OPTIONS]

Options:
  -u, --url TEXT        The URL to fuzz
  -v, --verify BOOLEAN  SSL certificate verification. Default True
  -w, --wordlist TEXT   /path/to/wordlist.txt
  --help                Show this message and exit.

Example:

$ sqlifuzzer -u https://redtiger.labs.overthewire.org/level1.php -v False -w url_fuzz.txt

Notes

A generic wordlist named url_fuzz.txt is available in the source code. You can use this wordlist or create your own!

Upcoming features:

  • Input parameters fuzzing
  • HTTP Verbs (GET, POST, PUT) fuzzing
  • Diverse wordlist

Contributions

All contributions are welcome. Just fork this repository, make your changes and open a pull request!

License

Distributed under MIT License.

About

Python script to fuzz for SQL injection vulnerabilities in URL and input parameters

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages