Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/stamparm/dsss
Damn Small SQLi Scanner
https://github.com/stamparm/dsss
Last synced: 10 days ago
JSON representation
Damn Small SQLi Scanner
- Host: GitHub
- URL: https://github.com/stamparm/dsss
- Owner: stamparm
- Created: 2011-07-17T21:46:39.000Z (over 13 years ago)
- Default Branch: master
- Last Pushed: 2020-05-27T02:26:00.000Z (over 4 years ago)
- Last Synced: 2024-10-14T17:18:54.373Z (28 days ago)
- Language: Python
- Homepage:
- Size: 61.5 KB
- Stars: 821
- Watchers: 32
- Forks: 195
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
Damn Small SQLi Scanner [![Python 3.x](https://img.shields.io/badge/python-3.x-yellow.svg)](https://www.python.org/) [![License](https://img.shields.io/badge/license-Public_domain-red.svg)](https://wiki.creativecommons.org/wiki/Public_domain)
=========**Damn Small SQLi Scanner** (DSSS) is a fully functional [SQL injection](https://en.wikipedia.org/wiki/SQL_injection) vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.
![Vulnerable](http://i.imgur.com/7mXeXjF.png)
As of optional settings it supports HTTP proxy together with HTTP header values `User-Agent`, `Referer` and `Cookie`.
Sample runs
----```
$ python3 dsss.py -h
Damn Small SQLi Scanner (DSSS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)Usage: dsss.py [options]
Options:
--version show program's version number and exit
-h, --help show this help message and exit
-u URL, --url=URL Target URL (e.g. "http://www.target.com/page.php?id=1")
--data=DATA POST data (e.g. "query=test")
--cookie=COOKIE HTTP Cookie header value
--user-agent=UA HTTP User-Agent header value
--referer=REFERER HTTP Referer header value
--proxy=PROXY HTTP proxy address (e.g. "http://127.0.0.1:8080")
``````
$ python3 dsss.py -u "http://testphp.vulnweb.com/artists.php?artist=1"
Damn Small SQLi Scanner (DSSS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)* scanning GET parameter 'artist'
(i) GET parameter 'artist' could be error SQLi vulnerable (MySQL)
(i) GET parameter 'artist' appears to be blind SQLi vulnerable (e.g.: 'http://t
estphp.vulnweb.com/artists.php?artist=1%20AND%2061%3E60')scan results: possible vulnerabilities found
```Requirements
----[Python](http://www.python.org/download/) version **3.x** is required for running this program.