Skip to main content

Automated SQL Vulnerable Sites Finder - DarkD0rk3r.py

Namaste Hackers,



Today, In this post I am going to show you how we can easily find a big list of SQL Injection Vulnerable Sites With The Help Of A Scanning Tools?

Introduction


Friends, Finding Big list of Vulnerable SQLi Sites Is really very time-consuming process. hence to make this process automatic and faster there is a python script that can do our all work in fewer mintures and the name of the script is DarkD0rk3r.py Version 1.0 Created by b4tazar. you can download this script from here. click here

After Downloading this Script, To Make This Script Executable You Just Need To Remove '.txt' extension from File Name. (rename "darkdork3r.py").

Usages Tutorial


Step 1.

            Now, Open A Terminal and Execute this script.

:~# python darkdork.py



Step 2.

Choose Target Domains And Enter Your Dork String. (Get a big list of google dorks. click here)


Step 3.

Enter No. Of Thread



Step 4.

Enter No. Of Page


Step 5.

Sit Back And Wait For Few Minutes




Step 6.

Select Your Vulnerability Test Type. as here i am selecting SQL Injection Testing



Step 7.

Again, Sit Back And Let Script to Extract Vulnerable Sites List.



Ho yeah we got the SQL vulnerable site. I hope now you got the right procedure to find vulnerable site list.

So, This Tutorial Ends Here.

Done!

Written By
                   SSB


Related Links


Check Here, How to Exploit SQLi Vulnerable Sites With SQLMAP.
Check Here. How To Manually Find Vulnerable SQLi Vulnerable Sites

Comments

Related Post

Top Visited

how to install burp suite in Linux/Ubuntu 16.04

Create Simple Packet Sniffer Using Python

Big List Of Google Dorks For Sqli Injection

Latest Google Dorks List

List of Keyboard Shortcuts Keys for GNOME Desktop (Kali linux / Linux / Ubuntu/*nix )

how to configure burpsuite with firefox?

Python Beautiful Soup Module - Tutorial - Part 2

Create Ping Sweeping Script Using Python

How to create Phishing Page Using Kali Linux | Webpage Page Cloning Using Kali Linux Social Engineering Toolkit

What is the use of Pseudo header in TCP/UDP packets?