{"id":13475630,"url":"https://github.com/stamparm/DSSS","last_synced_at":"2025-03-27T00:31:39.654Z","repository":{"id":43918068,"uuid":"2063350","full_name":"stamparm/DSSS","owner":"stamparm","description":"Damn Small SQLi Scanner","archived":false,"fork":false,"pushed_at":"2020-05-27T02:26:00.000Z","size":63,"stargazers_count":821,"open_issues_count":0,"forks_count":195,"subscribers_count":32,"default_branch":"master","last_synced_at":"2024-10-14T17:18:54.373Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/stamparm.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2011-07-17T21:46:39.000Z","updated_at":"2024-10-03T05:11:12.000Z","dependencies_parsed_at":"2022-08-30T17:20:54.736Z","dependency_job_id":null,"html_url":"https://github.com/stamparm/DSSS","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/stamparm%2FDSSS","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/stamparm%2FDSSS/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/stamparm%2FDSSS/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/stamparm%2FDSSS/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/stamparm","download_url":"https://codeload.github.com/stamparm/DSSS/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":245760767,"owners_count":20667887,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-07-31T16:01:22.075Z","updated_at":"2025-03-27T00:31:39.402Z","avatar_url":"https://github.com/stamparm.png","language":"Python","readme":"Damn Small SQLi Scanner [![Python 3.x](https://img.shields.io/badge/python-3.x-yellow.svg)](https://www.python.org/) [![License](https://img.shields.io/badge/license-Public_domain-red.svg)](https://wiki.creativecommons.org/wiki/Public_domain)\n=========\n\n**Damn Small SQLi Scanner** (DSSS) is a fully functional [SQL injection](https://en.wikipedia.org/wiki/SQL_injection) vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.\n\n![Vulnerable](http://i.imgur.com/7mXeXjF.png)\n\nAs of optional settings it supports HTTP proxy together with HTTP header values `User-Agent`, `Referer` and `Cookie`.\n\nSample runs\n----\n\n```\n$ python3 dsss.py -h\nDamn Small SQLi Scanner (DSSS) \u003c 100 LoC (Lines of Code) #v0.3a\n by: Miroslav Stampar (@stamparm)\n\nUsage: dsss.py [options]\n\nOptions:\n  --version          show program's version number and exit\n  -h, --help         show this help message and exit\n  -u URL, --url=URL  Target URL (e.g. \"http://www.target.com/page.php?id=1\")\n  --data=DATA        POST data (e.g. \"query=test\")\n  --cookie=COOKIE    HTTP Cookie header value\n  --user-agent=UA    HTTP User-Agent header value\n  --referer=REFERER  HTTP Referer header value\n  --proxy=PROXY      HTTP proxy address (e.g. \"http://127.0.0.1:8080\")\n```\n\n```\n$ python3 dsss.py -u \"http://testphp.vulnweb.com/artists.php?artist=1\"\nDamn Small SQLi Scanner (DSSS) \u003c 100 LoC (Lines of Code) #v0.3a\n by: Miroslav Stampar (@stamparm)\n\n* scanning GET parameter 'artist'\n (i) GET parameter 'artist' could be error SQLi vulnerable (MySQL)\n (i) GET parameter 'artist' appears to be blind SQLi vulnerable (e.g.: 'http://t\nestphp.vulnweb.com/artists.php?artist=1%20AND%2061%3E60')\n\nscan results: possible vulnerabilities found\n```\n\nRequirements\n----\n\n[Python](http://www.python.org/download/) version **3.x** is required for running this program.\n","funding_links":[],"categories":["Uncategorized","Python","Weapons","Tools","Pentesting"],"sub_categories":["Uncategorized","Tools","Payloads"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fstamparm%2FDSSS","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fstamparm%2FDSSS","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fstamparm%2FDSSS/lists"}