[Original] Top 15 free SQL Injection Scanners

Source: Internet
Author: User
Tags sql injection attack perl script

[Original] Top 15 free SQL Injection Scanners

If you are interested in SQL injection, please try the following tools :)

While the adoption of Web applications for conducting online business has enabled companies to connect seamlessly with their MERs, it has also exposed a number of security concerns stemming from improper coding. vulnerabilities in Web applications allow hackers to gain direct and public access to sensitive information (e.g. personal data, login credentials ).
Web applications allow visitors to submit and retrieve data to/from a database over the Internet. databases are the heart of most web applications. they hold data needed for web applications to deliver specific content to visitors and provide information to mers MERs, suppliers etc.
SQL InjectionIs perhaps the most common web-application hacking technique which attempts to pass SQL commands through a web application for execution by the back-end database. the vulnerability is presented when user input is incorrectly sanitized and thereby executed.
CheckingSQL InjectionVulnerabilities involves auditing your web applications and the best way to do it is by using automated SQL Injection scanners. we 've compiled a list of freeSQL Injection ScannersWe believe will be of a value to both web application developers and professional security auditors.

1. sqlier-Sqlier takes a vulnerable URL and attempts to determine all the necessary information to exploit the SQL injection vulnerability by itself, requiring no user interaction at all.
Get sqlier.

2. sqlbftools-Sqlbftools is a collection of tools to retrieve MySQL information available using a blind SQL injection attack.
Get sqlbftools.

3. SQL Injection brute-forcer-Sqlibf is a tool for automatizing the work of detecting and exploiting SQL injection vulnerabilities. sqlibf can work in visible and blind SQL injection. it works by doing simple logic SQL operations to determine the exposure level of the vulnerable application.
Get sqllibf.

4. sqlbrute-Sqlbrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities. it supports time based and Error Based exploit types on Microsoft SQL Server, and error based exploit on Oracle. it is written in Python, uses multi-threading, and doesn't require non-standard libraries.
Get sqlbrute.

5. Bobcat-Bobcat is a tool to aid an auditor in taking full advantage of SQL injection vulnerabilities. it is based on appsecinc research. it can list the linked severs, database schema, and allow the retrieval of data from any table that the current application user has access.
Get Bobcat.

6. sqlmap-Sqlmap is an automatic blind SQL injection tool, developed in Python, capable to perform an active database management system fingerprint, enumerate entire remote databases and much more. the aim of sqlmap is to implement a fully functional database management system tool which takes advantages of Web application programming security flaws which lead to SQL injection vulnerabilities.
Get sqlmap.

7. Absinthe-Absinthe is a GUI-based tool that automates the process of downloading the schema and contents of a database that is vulnerable to blind SQL injection.
Get absinthe.

8. SQL Injection pen-Testing Tool-The SQL injection tool is a GUI-based utility designed to examine database through vulnerabilities in Web-applications.
Get SQL Injection pen-testing tool.

9. sqid-SQL Injection digger (sqlid) is a command line program that looks for SQL injections and Common Errors in websites. it can perform the follwing operations: Look for SQL Injection in a web pages and test submit forms for possible SQL injection vulnerabilities.
Get sqid.

10. Blind SQL Injection Perl Tool-Bsqlbf is a Perl script that lets auditors retrieve information from web sites that are vulnerable to SQL injection.
Get blind SQL Injection Perl tool.

11. SQL power injection-SQL power injection helps the Penetration Tester to inject SQL commands on a web page. It's main strength is its capacity to automate tedious blind SQL injection with several threads.
Get SQL power injection.

12. fj-injector framwork-FG-injector is a free open source framework designed to help find SQL Injection Vulnerabilities in Web applications. it includes des a proxy feature for intercepting and modifying HTTP requests, and an interface for automatic SQL injection exploitation.
Get FJ-injector framework.

13. sqlninja-Sqlninja is a tool to exploit SQL injection vulnerabilities on a Web application that uses Microsoft SQL Server as its back-end database. Get sqlninja.

14. automagic SQL Injector-The automagic SQL injector is an automatic SQL injection tool designed to help save time on penetration testing. It is only designed to work with vanilla Microsoft SQL Injection holes where errors are returned.
Get automagic SQL injector.

15. ngss SQL Injector-Ngss SQL injector exploit vulnerabilities in SQL Injection on disparate database servers to gain access to stored data. it currently supports the following databases: Access, DB2, Informix, MSSQL, MySQL, Oracle, sysbase.
Get ngss SQL Injector

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.