SQLand is a tool for detecting SQL Injection vulnerabilities in web applications. It supports both time-based and error-based blind SQL injection detection techniques.
- ⚡ High-efficient and multi-threading.
- 📋 Comprehensive logging.
- 🌈 Colored output for better readability.
- 🕔 Time-based Blind SQL Injection detection.
- 🔍 Error-based Blind SQL Injection detection.
- ❌ Smart DOM sql-like errors detection.
- 🍪 Custom cookies, headers and static params support.
To use SQLand, clone the repository and run the tool with the appropriate arguments.
| Argument | Description | Type | Multi |
|---|---|---|---|
-x --method |
HTTP method to use | GET POST PUT PATCH DELETE |
❌ |
-H --header |
Append a header to the request | "string: string" |
✅ |
-c --cookie |
Append a cookie to the request | "string: string" |
✅ |
-p --param |
Add a query/body param to fuzz payloads | string |
✅ |
-d --data |
Append a query/body param without fuzz | "string: string" |
✅ |
-j --json |
Post param and data as JSON | boolean |
❌ |
-f --form |
Post param and data as Form Data | boolean |
❌ |
-w --workers |
Number of simultaneous payload requests | number (Default 4) |
❌ |
-n --no_filtering |
Don't use vanilla request for filtering | boolean |
❌ |
-s --offset_samples |
Samples to calculate avg response time | number (Default 0) |
❌ |
-o --offset |
Time based attack latency offset | number (Default 0) |
❌ |
# Command syntax
sqland <Optional Arguments> [URL] # This is valid.
sqland [URL] <Optional Arguments> # This is valid too.
# Example for http://example.com/search?query=<payload>
sqland http://example.com/search -p query
# Example for http://example.com/search?query=<payload>&foo=bar
sqland http://example.com/search -p query -d foo=bar# Install Rust
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
# Clone repository
git clone https://github.com/sammwyy/sqland
# Build
cd sqland && cargo build --releaseWe welcome contributions! If you'd like to contribute, please follow these steps:
- Fork the repository.
- Create a new branch (git checkout -b feature-branch).
- Make your changes.
- Commit your changes (git commit -am 'prefix: 😀 describe your commit here').
- Push to the branch (git push origin feature-branch).
- Create a new Pull Request.
Please ensure your code adheres to the existing style, and includes tests where applicable. Feel free to check issues page.
Give a ⭐️ if this project helped you! Or buy me a coffeelatte 🙌 on Ko-fi