🔧 Features | 🛡️ WAF Identification | 🔍 Fingerprinting | 💥 Injection Types | 🎨 GUI | ⚙️ SQL Query Builder
- Detect Web Application Firewalls (WAFs) by analyzing HTTP headers and server responses.
- Identifies potential WAFs based on changes in response status codes and content patterns.
- Automatically detects the type of database by analyzing errors and executing advanced SQL injection techniques like UNION and stacked queries.
- Custom tool-generated queries ensure precise fingerprinting.
- Automatically selects the correct SQL dialect (MySQL, PostgreSQL, MSSQL, etc.) based on the target DBMS.
- Ensures the right syntax for effective SQL injections.
- In development, this feature helps identify table columns and the name of the current database for more advanced injections.
- Essential for gaining deeper access to database structures.
- Supports Blind Injections (Boolean and Time-based), Error-based Injections, and UNION-based Injections.
- Queries for these injection types are automatically created by the tool’s custom query generator.
- Modern, user-friendly interface designed to simplify the process, making it accessible for both experienced pentesters and beginners.
- Features intuitive controls for both new and experienced users.
- Generates tailored SQL payloads for each DBMS, optimizing query structure, including custom openings, endings, and elements.
- Fully automated query builder for each injection type.
Ensure you have Python 3.x installed and the required dependencies:
pip install flask pymysql
Clone the repository and install dependencies:
git clone https://github.com/Axion-Security/GoInjection.git
pip install flask pymysql
Set up a basic SQL Injection Lab for testing:
USE sql_injection_lab;
CREATE TABLE IF NOT EXISTS products (
id INT AUTO_INCREMENT PRIMARY KEY,
name VARCHAR(100) NOT NULL,
price DECIMAL(10, 2) NOT NULL
);
INSERT INTO products (name, price) VALUES
('Laptop', 799.99),
('Smartphone', 599.99),
('Tablet', 399.99),
('Headphones', 49.99),
('Smartwatch', 199.99);
This project is licensed under the License. See the LICENSE
file for more details.