π§ Features | π‘οΈ WAF Identification | π Fingerprinting | π₯ Injection Types | π¨ GUI | βοΈ SQL Query Builder
- Detect Web Application Firewalls (WAFs) by analyzing HTTP headers and server responses.
- Identifies potential WAFs based on changes in response status codes and content patterns.
- Automatically detects the type of database by analyzing errors and executing advanced SQL injection techniques like UNION and stacked queries.
- Custom tool-generated queries ensure precise fingerprinting.
- Automatically selects the correct SQL dialect (MySQL, PostgreSQL, MSSQL, etc.) based on the target DBMS.
- Ensures the right syntax for effective SQL injections.
- In development, this feature helps identify table columns and the name of the current database for more advanced injections.
- Essential for gaining deeper access to database structures.
- Supports Blind Injections (Boolean and Time-based), Error-based Injections, and UNION-based Injections.
- Queries for these injection types are automatically created by the toolβs custom query generator.
- Modern, user-friendly interface designed to simplify the process, making it accessible for both experienced pentesters and beginners.
- Features intuitive controls for both new and experienced users.
- Generates tailored SQL payloads for each DBMS, optimizing query structure, including custom openings, endings, and elements.
- Fully automated query builder for each injection type.
Ensure you have Python 3.x installed and the required dependencies:
pip install flask pymysql
Clone the repository and install dependencies:
git clone https://github.com/Axion-Security/GoInjection.git pip install flask pymysql
Set up a basic SQL Injection Lab for testing:
USE sql_injection_lab; CREATE TABLE IF NOT EXISTS products ( id INT AUTO_INCREMENT PRIMARY KEY, name VARCHAR(100) NOT NULL, price DECIMAL(10, 2) NOT NULL ); INSERT INTO products (name, price) VALUES ('Laptop', 799.99), ('Smartphone', 599.99), ('Tablet', 399.99), ('Headphones', 49.99), ('Smartwatch', 199.99);
This project is licensed under the License. See the LICENSE file for more details.