SQL Injection Dorker & Checker | Scrapes vuln websites from multiple search engines and checks them.

  • Thread starter Shadow Warrior
  • Start date
  • Tagged users None
Shadow Warrior

Shadow Warrior

Infinity Member
Golden Member
Joined
June 14, 2024
Messages
2,816
Reaction score
108,560
Points
113
FEATURES :
- uses multiple search engines ( google , bing etc )
- proxy support ( can work without proxies as well )
- automatic checker to check if the links are sql injectable
TUTORIAL :
Prerequisites
1. Python 3 installed on your system.
2. The `requirements.txt` file in the same directory as your script.
Installation
1. Open a terminal or command prompt.
2. Navigate to the directory containing your script and the `requirements.txt` file.
3. Run the following command to install the required dependencies:

pip install -r requirements.txt
Usage
Run the script using the following command:
bash
python sql.py
The script will prompt you with the following options:
text
Choose an option:
(1) Only search for the selected search engine using dorks
(2) Search the selected search engine for dorks and check which link is SQL injectable
Your choice (1 or 2):
Enter 1 to only search for the selected search engine using dorks, or 2 to search and check for SQL injection vulnerabilities.
If you choose option 1, the script will ask you:
text
Do you want to use proxies? (yes/no):
Enter yes if you want to use proxies, or no if you don't.
If you choose to use proxies, provide the following information:
text
Enter the path to the proxy file (formatted as url:username:password):
Enter the type of proxies (http, https, socks5, etc.):
Enter the path to the proxy file (formatted as url:username:password) and the type of proxies you are using (e.g., http, https, socks5).
The script will then prompt you to choose the search engine:
text
Which search engine do you want to scrape? (google/bing/duckduckgo):
Enter the name of the search engine you want to use (google, bing, or duckduckgo).
Next, enter your dork query or choose from the example dorks provided:

Enter your dork query (e.g., inurl:"product.php?pid=") or choose from these dorks: inurl:"index.php?id=", inurl:"trainers.php?id=", ...
Finally, enter the number of pages you want to scrape:
Enter the number of pages to scrape:
The script will start searching the selected search engine using the provided dork query and save the found links to the found_links.txt file.
If you chose option 2, the script will also check the found links for SQL injection vulnerabilities and save the results to the vulnerable_links.txt file.
To see this hidden content, you must reply and react with one of the following reactions : Like Like, Love Love, Haha Haha, Wow Wow
 
  • Like
Reactions: AG15, Sergo, clawsn666 and 44 others
X

xenodev

New Member
Joined
December 6, 2025
Messages
3
Reaction score
0
Points
1
chuchaaaaaaaaaaaaaaaaaaaaa
 

User Who Replied This Thread (Total Members: 47) Show all

  • intakemanifold
  • Pazzo59
  • moneyworld001
  • mrtroy999
  • user19
  • 0xH3x
  • kamprov
  • turko92u74
  • Yuri
  • sterne7x1
  • darkrzk1533
  • smoothsilk
  • pegeenlonely
  • xiaoxiao
  • saw2025
  • sfverer34232
  • ezfeefgyefgyegy
  • xyzchoko
  • n2ochk98s7@iwat
  • Merc
  • jsgbjflsbgznbjg
  • MikeSmith
  • test00010
  • xxav
  • otoritemm
  • sadasddasd
  • comerado
  • kamusa
  • grdsgrfdsehbrte
  • motion12
  • clawsn666
  • Rayan_77
  • m3tsm
  • X32
  • mosat
  • poronda
  • arguino88
  • yowolf_2
  • bit141319
  • 0zzyTh3F0xxy
  • maritekva
  • nvtrem
  • URVU1N3RABLE
  • xenodev
  • AG15
  • somalidefender
  • Sergo
  • Tags
    checker checks injection search engines sql sql injection websites
  • Top