Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/zt2/sqli-hunter
SQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.
https://github.com/zt2/sqli-hunter
detection exploitation pentesting ruby sql-injection sqlmap vulnerability-scanner
Last synced: about 1 month ago
JSON representation
SQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.
- Host: GitHub
- URL: https://github.com/zt2/sqli-hunter
- Owner: zt2
- Created: 2015-03-11T12:59:57.000Z (almost 10 years ago)
- Default Branch: master
- Last Pushed: 2024-04-27T12:33:43.000Z (8 months ago)
- Last Synced: 2024-08-01T09:24:57.030Z (4 months ago)
- Topics: detection, exploitation, pentesting, ruby, sql-injection, sqlmap, vulnerability-scanner
- Language: Ruby
- Homepage:
- Size: 65.4 KB
- Stars: 421
- Watchers: 19
- Forks: 129
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-bugbounty-tools - sqli-hunter - SQLi-Hunter is a simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy. (Exploitation / SQL Injection)
- awesome-network-stuff - **231**星 - Hunter is a simple HTTP proxy server and a SQLMAP API wrapper that makes digging SQLi easy. (<a id="d03d494700077f6a65092985c06bf8e8"></a>工具 / <a id="b6f25145e99ea944cbb528a24afaa0be"></a>HTTP&&HTTPS)
README
# SQLi-Hunter
SQLi-Hunter is a simple HTTP/HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy.
## 0x0 Installation
### Using Docker
- Build the Docker image:
```
docker build -t sqli-hunter https://github.com/zt2/sqli-hunter.git
```- Run the Docker image:
```
docker run -ti -p 8080:8080 -p 8081:8081 -v /tmp:/tmp --rm sqli-hunter --host=0.0.0.0
```The volume argument allows SQLi-Hunter to persist output files to be accessed on the host system. The port mapping argument will enable SQLi-Hunter to start a proxy server and a reverse SSL proxy server to be accessed on the host system.
- Install CA (`cert/sqli-hunter.pem`) on the device you want to test
- Setup proxy (port `8080`) in the browser and you are ready to go.### From source
- Build from the latest release of the source code:
```
git clone https://github.com/sqlmapproject/sqlmap.git
git clone https://github.com/zt2/sqli-hunter.git
cd sqli-hunter
gem install bundler
bundler install
```- Start SQLMAP API server manually.
```
python sqlmapapi.py -s
```- Run SQLi-Hunter
```
ruby bin/sqli-hunter.rb
```- Configure proxy server settings in your browser
## 0x1 Usage
```
_____ _____ __ _ _____ _
| __| | | |_|___| | |_ _ ___| |_ ___ ___
|__ | | | |__| |___| | | | | _| -_| _|
|_____|__ _|_____|_| |__|__|___|_|_|_| |___|_|
|__|SQLMAP API wrapper by ztz (github.com/zt2)
Usage: bin/sqli-hunter.rb [options]
Common options:
-h, --host=[HOST] Bind host for proxy server (default is localhost)
-p, --port= Bind port for proxy server (default is 8080)
--sqlmap-host=[HOST] Host for sqlmap api (default is localhost)
--sqlmap-port=[PORT] Port for sqlmap api (default is 8775)
--targeted-hosts=[HOSTS] Targeted hosts split by comma (default is all)
--version Display versionSQLMAP options
--technique=[TECH] SQL injection techniques to use (default "BEUSTQ")
--threads=[THREADS] Max number of concurrent HTTP(s) requests (default 5)
--dbms=[DBMS] Force back-end DBMS to this value
--os=[OS] Force back-end DBMS operating system to this value
--tamper=[TAMPER] Use given script(s) for tampering injection data
--level=[LEVEL] Level of tests to perform (1-5, default 1)
--risk=[RISK] Risk of tests to perform (0-3, default 1)
--mobile Imitate smartphone through HTTP User-Agent header
--smart Conduct through tests only if positive heuristic(s)
--random-agent Use randomly selected HTTP User-Agent header value
```Output:
```
➜ sqli-hunter git:(master) ruby bin/sqli-hunter.rb --targeted-hosts=demo.aisec.cn --threads=15 --random-agent --smart
[01:50:17] [INFO] [bdf9f3495bb70fbc] task created
[01:50:17] [INFO] [bdf9f3495bb70fbc] task started
[01:50:20] [INFO] [bdf9f3495bb70fbc] task finished
[01:50:20][SUCCESS] [bdf9f3495bb70fbc] task vulnerable, use 'sqlmap -r /var/folders/kb/rwf8j7051x71q4flc_s39wzm0000gn/T/d20191021-40013-17a62ve/5f8a3ad452a15777219b8a5c8c7ec3b6' to exploit
```