{"id":26896890,"url":"https://github.com/HackfutSec/Detected","last_synced_at":"2025-04-01T04:02:22.872Z","repository":{"id":282979672,"uuid":"950292907","full_name":"HackfutSec/Detected","owner":"HackfutSec","description":"Detected : A powerful and user-friendly tool for detecting SQL injection vulnerabilities in web applications, supporting GET/POST requests, custom payloads, cookies, and detailed reporting.","archived":false,"fork":false,"pushed_at":"2025-03-18T12:50:16.000Z","size":36,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-25T13:27:16.802Z","etag":null,"topics":["cookies","cybersecurity","ethical-hacking","ethical-hacking-tools","hacking","hacking-tool","multithreading","python","sql-injection","sqlite"],"latest_commit_sha":null,"homepage":"https://github.com/HackfutSec/Detected.git","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/HackfutSec.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2025-03-17T23:55:34.000Z","updated_at":"2025-03-23T07:09:27.000Z","dependencies_parsed_at":"2025-03-18T01:21:44.715Z","dependency_job_id":"d5506e24-fdde-415f-a755-da2459f7ed89","html_url":"https://github.com/HackfutSec/Detected","commit_stats":null,"previous_names":["hackfutsec/detected"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/HackfutSec%2FDetected","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/HackfutSec%2FDetected/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/HackfutSec%2FDetected/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/HackfutSec%2FDetected/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/HackfutSec","download_url":"https://codeload.github.com/HackfutSec/Detected/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246580468,"owners_count":20800111,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cookies","cybersecurity","ethical-hacking","ethical-hacking-tools","hacking","hacking-tool","multithreading","python","sql-injection","sqlite"],"created_at":"2025-04-01T04:02:21.787Z","updated_at":"2025-04-01T04:02:22.866Z","avatar_url":"https://github.com/HackfutSec.png","language":"Python","readme":"```markdown\n# Detected: SQL Injection Testing Tool\n\n![GitHub](https://img.shields.io/github/license/HackfutSec/Detected)\n![GitHub release (latest by date)](https://img.shields.io/github/v/release/HackfutSec/Detected)\n![GitHub issues](https://img.shields.io/github/issues/HackfutSec/Detected)\n![GitHub stars](https://img.shields.io/github/stars/HackfutSec/Detected)\n\n**Detected** is a powerful and user-friendly tool designed to detect SQL injection vulnerabilities in web applications. It supports both GET and POST requests, custom payloads, cookies for authenticated testing, and generates detailed JSON reports.\n\n---\n\n## Features\n\n- **SQL Injection Detection**: Tests input parameters for SQLi vulnerabilities.\n- **GET and POST Support**: Allows testing of forms and URLs.\n- **Custom Payloads**: Load payloads from a file or use the built-in library.\n- **Cookie Management**: Test authenticated endpoints using cookies.\n- **Detailed Reporting**: Generates a JSON report of detected vulnerabilities.\n- **Multi-threading**: Tests multiple URLs and parameters simultaneously for improved efficiency.\n- **Update Checker**: Notifies users of new versions.\n\n---\n\n## Installation\n\n### Prerequisites\n\n- Python 3.7 or higher\n- Python libraries: `requests`, `colorama`, `tqdm`, `bs4`\n\n### Installation Steps\n\n1. Clone the repository:\n   ```bash\n   git clone https://github.com/HackfutSec/Detected.git\n   cd Detected\n   ```\n\n2. Install dependencies:\n   ```bash\n   pip install -r requirements.txt\n   ```\n\n3. Run the tool:\n   ```bash\n   python detected.py\n   ```\n\n---\n\n## Usage\n\n### Testing a Single URL\n\n1. Run the tool:\n   ```bash\n   python detected.py\n   ```\n\n2. Choose option `1` to test a single URL.\n3. Enter the URL, the parameter to test, and choose the method (GET or POST).\n4. Use default payloads or load a custom payload file.\n5. If needed, provide a cookie file for authenticated testing.\n\n### Testing a File of URLs\n\n1. Run the tool:\n   ```bash\n   python detected.py\n   ```\n\n2. Choose option `2` to test a file of URLs.\n3. Enter the path to the file containing URLs, the parameter to test, and choose the method (GET or POST).\n4. Use default payloads or load a custom payload file.\n5. If needed, provide a cookie file for authenticated testing.\n\n### Reports\n\nDetected vulnerabilities are logged in `vulnerable_urls.txt`. A detailed report is generated in `report.json`.\n\n---\n\n## Examples\n\n### Testing a URL with Default Payloads\n```bash\npython detected.py\n1\nhttp://example.com/page?id=1\nid\n1\n1\nn\n```\n\n### Testing a File of URLs with Cookies\n```bash\npython detected.py\n2\nurls.txt\nid\n1\n1\ny\ncookies.json\n```\n\n---\n\n## Project Structure\n\n```\nDetected/\n├── detected.py            # Main script\n├── requirements.txt       # Python dependencies\n├── payloads.txt           # Example payload file\n├── cookies.json           # Example cookie file\n├── report.json            # Generated report\n├── vulnerable_urls.txt    # Detected vulnerable URLs\n└── README.md              # Documentation\n```\n\n---\n\n## Contributing\n\nContributions are welcome! To contribute:\n\n1. Fork the repository.\n2. Create a branch for your feature (`git checkout -b feature/AmazingFeature`).\n3. Commit your changes (`git commit -m 'Add some AmazingFeature'`).\n4. Push the branch (`git push origin feature/AmazingFeature`).\n5. Open a Pull Request.\n\n---\n\n## License\n\nThis project is licensed under the MIT License. See the [LICENSE](LICENSE) file for details.\n\n---\n\n## Authors\n\n- **HackfutSec** - Lead developer\n- **Contributors** - See the list of [contributors](https://github.com/HackfutSec/Detected/contributors).\n\n---\n\n## Acknowledgments\n\n- Thanks to the open-source community for the libraries used in this project.\n- Inspired by popular security tools like SQLmap.\n\n---\n\n## Support\n\nFor questions or issues, open an [issue](https://github.com/HackfutSec/Detected/issues) on GitHub.\n\n```\n\n---\n\n### Key Points of the README:\n1. **Title and Badges**: Shows the project status (version, license, issues, etc.).\n2. **Description**: Briefly explains what the tool is and its main features.\n3. **Installation**: Provides clear instructions for installing and setting up the tool.\n4. **Usage**: Offers practical examples for testing URLs and files.\n5. **Project Structure**: Describes the organization of files in the repository.\n6. **Contributing**: Encourages contributions and explains how to contribute.\n7. **License**: Specifies the project license.\n8. **Authors and Acknowledgments**: Recognizes contributors and inspirations.\n9. **Support**: Indicates how to get help.\n","funding_links":[],"categories":["Python"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FHackfutSec%2FDetected","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FHackfutSec%2FDetected","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FHackfutSec%2FDetected/lists"}