Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/bash
- # What Ever you re-code this
- # Special Thanks
- # Wingkocoli - Backbox Linux Indonesia
- # I built this tool because bored with the Weekend
- # Tools that may not be useful because
- # It knows the vuln or not the website can be manually
- # ./anakayam
- echo `clear`;
- echo -e "\033[0m"
- printf " +=============================================+"'\n'
- printf " | Mass Vuln Web SQL Injection Scanner |"'\n'
- printf " | Code By : ./anakayam |"'\n'
- printf " | Wingkocoli - Bacbkox Linux Indonesia |"'\n'
- printf " +=============================================+"'\n''\n'
- function check {
- b="Using : -w [Your Mass Target]\nExample : basename -w target.txt\n
- "
- echo -e $b
- exit 1
- }
- [ "$1" ] || check;
- while getopts w: OPT ;
- do
- #statements
- case "$OPT" in
- "w") masstarget="${OPTARG}" ;;
- esac
- done
- [ $masstarget ] || check;
- printf '\n'"[*] Scanning target file => $masstarget"'\n''\n'
- for vuln in `cat $masstarget`
- do
- echo -e "\033[1;34m[*]\033[0m Scanning => $vuln"
- page=$(curl -s $vuln"'")
- if [[ $page =~ "SQL" ]]; then
- echo -e "\e[32m[+] $vuln => Vulneraibility SQl Injection\n"
- echo $vuln >> vuln.txt
- else
- echo -e "\e[31m[-] $vuln => Not Vulneraibility"
- echo -e "\033[0m"
- fi
- done
- echo -e "\033[1;34m[!]Vulneraibility Web Success Saved in vuln.txt\n"
- echo -e "\033[0m"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement