HOCSQLI Automatic SQL Injection Vulnerability Scanner

HOCSQLI Automatic SQL Injection Vulnerability Scanner
(Last Updated On: June 13, 2021)

Today, we are presenting our own Cyber Intelligence suite HOCSQLI.

An Automatic (SQL Injection) vulnerability scanner along with the complete demonstration tutorial.

What is in HOCSQLI Automatic SQL injection Vulnerability Scanner?

HOCSQLI is an easy way for penetration tester and bug bounty hunters to test SQL Injection vulnerability in the website. It can crawling and scan all the links as well.

Note: This HOCSQLI scanner wouldn’t require you to install any Library. It automatically detects, installs, and run the required files for you.

It’s main features are:

  • It can scan A target anonymously using TOR
  • Multi-threaded crawling
  • Auto-detect method GET/POST
  • Set cookie
  • Set Random User agents

So lets start..

Requirements:

How to install manually?

Open the Terminal and type the following codes

>git clone https://github.com/hackersonlineclub/HOCSQLI.git

>cd HOCSQLI/

>sudo python3 hocsqli.py

Output results are as follows –

4

First step is to select Press 1 for scan without TOR or Press 2 for scan with TOR and hit enter

5

The second step is to select Press 1 for Quick scan it will scan only the given URL or Press 2 for Intensive scan it will scan all the links on a page (using crawl) is to enter the target website(If using intensive scan) or URL and hit enter.

It will ask for Cookie Y/N. If want to enter your own Cookie press Y or y then enter cookie-like
Example:- {“ID”:”989856547”}
N or n for attack without cookie and hit enter

Here our target is testphp.vulnweb.com/artist.php?artist=1

Screenshot from 2021 05 04 19 50 57

Intensive scan (scan all the URL in the website) with TOR

Press 2 for use HOCSQLI with TOR

9 tor

Press 2 for Intensive scan it will scan all the links on a page (using crawl) is to enter the target website or URL and hit enter.

6

If you want to set cookies or random user agent press Y and then enter the Cookie details, else press N or n.

Here our target is testphp.vulnweb.com

12

Results:-

8
Screenshot from 2021 05 04 19 49 07

Also See: HOCIG Information Gathering Suite

administrator

Leave a Reply

Your email address will not be published. Required fields are marked *

fb logo
recover dogecoin from a scam
recover ethereum from a scammer
hire a hacker to hack iphone
hire a hacker to hack snapchat
hire a hacker to hack a windows computer
error: Content is protected !!