#vulnerabilities #command-line #check #injection #sql

app injectsql

Command Line Tools to check for SQL Injection vulnerability

5 releases (breaking)

0.5.0 Nov 8, 2024
0.4.0 Oct 23, 2024
0.3.0 Oct 17, 2024
0.2.0 Oct 15, 2024
0.1.0 Oct 13, 2024

#676 in Database interfaces

Download history 275/week @ 2024-10-10 361/week @ 2024-10-17 33/week @ 2024-10-24 3/week @ 2024-10-31 116/week @ 2024-11-07 4/week @ 2024-11-14 4/week @ 2024-11-21 27/week @ 2024-11-28 122/week @ 2024-12-05

158 downloads per month

MIT license

1MB
252 lines

Logo

🛢️ 🖥️ Command Line Tools to check for SQL Injection vulnerability. This tool is to help pentest in their daily lives quickly.

Installing

Cargo

Installing from crates.io (requires Rust/Cargo):

cargo install injectsql

Homebrew

You can install with Homebrew:

brew tap heroesofcode/taps
brew install heroesofcode/taps/injectsql

Usage

injectsql

If you want to test or are studying pentest I recommend you use these tools below:

[!IMPORTANT] injeqtor does not perform an in-depth SQL injection attack, it only checks whether SQL Injection is vulnerable and tries to find the name of the database. If you want to carry out an attack to obtain more information, I recommend using sqlmap.

[!WARNING] The use of the injectsql tool for offensive activities without express permission from the parties involved is illegal. The user is solely responsible for ensuring compliance with applicable local, state and federal laws. The creators of this software are not responsible for any misuse or damages resulting from the use of this program.

Contributing

To contribute, just fork this project and then open a pull request, feel free to contribute, bring ideas and raise any problem in the issue tab.

License

injeqtor is released under the MIT license. See LICENSE for details.

Dependencies

~18–33MB
~501K SLoC