https://github.com/the404hacking/dsss
Damn Small SQLi Scanner. (DSSS)
https://github.com/the404hacking/dsss
damn dsss scanner sql sql-injection sqli sqlmap the404hacking
Last synced: 9 months ago
JSON representation
Damn Small SQLi Scanner. (DSSS)
- Host: GitHub
- URL: https://github.com/the404hacking/dsss
- Owner: The404Hacking
- Created: 2017-11-25T05:36:43.000Z (about 8 years ago)
- Default Branch: master
- Last Pushed: 2017-11-25T05:48:50.000Z (about 8 years ago)
- Last Synced: 2025-04-01T15:09:31.079Z (10 months ago)
- Topics: damn, dsss, scanner, sql, sql-injection, sqli, sqlmap, the404hacking
- Language: Python
- Homepage: https://T.me/The404Hacking
- Size: 420 KB
- Stars: 16
- Watchers: 0
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
Damn Small SQLi Scanner [](https://www.python.org/) [](https://wiki.creativecommons.org/wiki/Public_domain)
=========
**Damn Small SQLi Scanner** (DSSS) is a fully functional [SQL injection](https://en.wikipedia.org/wiki/SQL_injection) vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.

As of optional settings it supports HTTP proxy together with HTTP header values `User-Agent`, `Referer` and `Cookie`.
Sample runs
----
```
$ python dsss.py -h
Damn Small SQLi Scanner (DSSS) < 100 LoC (Lines of Code) #v0.2o
by: Miroslav Stampar (The404Hacking)
Usage: dsss.py [options]
Options:
--version show program's version number and exit
-h, --help show this help message and exit
-u URL, --url=URL Target URL (e.g. "http://www.target.com/page.php?id=1")
--data=DATA POST data (e.g. "query=test")
--cookie=COOKIE HTTP Cookie header value
--user-agent=UA HTTP User-Agent header value
--referer=REFERER HTTP Referer header value
--proxy=PROXY HTTP proxy address (e.g. "http://127.0.0.1:8080")
```
```
$ python dsss.py -u "http://testphp.vulnweb.com/artists.php?artist=1"
Damn Small SQLi Scanner (DSSS) < 100 LoC (Lines of Code) #v0.2o
by: Miroslav Stampar (@stamparm)
* scanning GET parameter 'artist'
(i) GET parameter 'artist' could be error SQLi vulnerable (MySQL)
(i) GET parameter 'artist' appears to be blind SQLi vulnerable (e.g.: 'http://t
estphp.vulnweb.com/artists.php?artist=1%20AND%2061%3E60')
scan results: possible vulnerabilities found
```
Requirements
----
[Python](http://www.python.org/download/) version **2.6.x** or **2.7.x** is required for running this program.
## Download and Clone
> Download: Click [Here](https://github.com/The404Hacking/DSSS/archive/master.zip) (DSSS-master.zip)
> Clone: git clone [https://github.com/The404Hacking/DSSS.git](https://github.com/The404Hacking/DSSS.git)
## The404Hacking | Digital UnderGround Team
[The404Hacking](https://T.me/The404Hacking)
## Follow us !
[The404Hacking](https://T.me/The404Hacking) - [The404Cracking](https://T.me/The404Cracking)
[Instagram](https://instagram.com/The404Hacking) - [GitHub](https://github.com/The404Hacking)
[YouTube](http://yon.ir/youtube404) - [Aparat](http://www.aparat.com/The404Hacking)
[Weblog](http://the404hacking.blogsky.com) - [Email](mailto:The404Hacking.Team@Gmail.Com)