October 15

SQL Injection Scanner GUI

Cканер SQL-инъекций на основе графического интерфейса пользователя, разработанный на Python. тестировщиков на проникновение и разработчиков веб-приложений. Инструмент предоставляет комплексные возможности оценки уязвимостей.

Сообщество THREAD предупреждает, что перед запуском предоставленного программного обеспечения необходимо проявить особую осторожность. Для защиты рабочих станций от возможного заражения рекомендуется использовать виртуальную машину или песочницу.
Все осуществляется на ваш страх и риск!

Особенности:

Core Capabilities:

  • Multi-Vector Testing: Simultaneous scanning across URL parameters, HTML forms, and HTTP headers
  • Intelligent Payload Management: 5 specialized SQLi payload categories with custom configuration
  • Advanced Detection Methods: Error-based pattern matching combined with time-based blind SQLi detection
  • Batch Processing: Efficient multi-URL scanning with configurable threading and request delays

Technical Features:

  • Comprehensive Header Testing: Smart SQLi testing on security-relevant HTTP headers (User-Agent, X-Forwarded-For, Referer, etc.)
  • Form Auto-Detection: Automatic form discovery and field analysis with support for GET/POST methods
  • Parameter Extraction: Intelligent URL parameter parsing and injection testing
  • Custom Configuration: Fully customizable payload sets, HTTP headers, and scanning parameters
  • SSL/TLS Control: Configurable SSL verification with proxy support

Professional Workflow:

  • Real-time Monitoring: Live progress tracking with detailed logging
  • Results Management: Advanced filtering by type, severity, and search terms
  • Export Capabilities: Comprehensive JSON reporting with scan metadata
  • Statistical Analysis: Detailed vulnerability statistics and scan summaries

Payload Arsenal:

  • Generic SQLi: Basic injection patterns for broad coverage
  • Error-Based: Payloads designed to trigger database errors
  • Time-Based: Blind SQLi detection using response timing
  • Union Select: Data extraction through UNION statements
  • Auth Bypass: Specialized authentication bypass techniques

Enterprise Ready:

  • Persistent configuration management
  • Cross-platform compatibility
  • Professional dark-themed UI
  • Resource-efficient operation

Target Users:

  • Security Researchers & Penetration Testers
  • Web Application Developers
  • Bug Bounty Hunters
  • IT Security Teams
  • Compliance Auditors

Download | VT