SQL Error is a tool to scan web pages for potential SQL injection vulnerabilities. It sends HTTP requests to URLs and checks if the response contains SQL syntax error messages, indicating a potential vulnerability.
- To run the SQL Error, you need to have Python installed on your system. You also need to install the following libraries using the
requirements.txt
file:pip install -r requirements.txt
- Clone this repository to your local machine.
- Navigate to the project directory.
- You can run the SQL Error using the following command:
python SqlError.py [base_url]
If you provide the base_url argument, the scanner will start scanning from that URL.
If you don't provide the base_url argument, the scanner will prompt you to enter the start URL.
Press Ctrl+C at any time to interrupt the scanning process. The scanner will display the URLs with potential SQL injection vulnerabilities found during the scan.
Start scanning from a specific URL:
python SqlError.py [base_url]
Start scanning with user input for the start URL:
python SqlError.py
This tool is for educational and informational purposes only. Use it responsibly and only on websites that you have permission to scan. The authors are not responsible for any misuse or damage caused by this tool.
This project is licensed under the MIT License.