hedef sitede sql açığı taramak için kullanabileceğiniz bir araç : )
Revealed content
Kod:
#coding:utf-8
#Kodlayan : Savaş
#discord : Savaş#5591
#instagram : savas_xd
import requests
import re
hedef = raw_input("hedef site giriniz : ")
print("")
sayi = 0
dork = "site:"+hedef+" .php?id="
hatalar = ["Syntax error","mysql_fetch_array()","mysql_numrows()","FetchRow()","error in your SQL syntax"]
while sayi <= 200:
r = requests.get("http://www.bing.com/search?q=" + dork + "&count=50&first=" + str(sayi))
bul = re.findall('<h2><a href="(.*?)"', r.text)
for link in bul:
try:
xd = False
r2 = requests.get(link+"'")
for hata in hatalar:
if re.search(hata, r2.text):
print("\n-------------------------------------------------")
print("bulundu --> " + link)
print("hata kodu --> " + hata)
print("-------------------------------------------------\n")
xd = True
break
if xd == False:
print("bulunamadi --> " + link)
except:
print("bulunamadi --> " + link)
sayi +=20