https://github.com/byt3n33dl3/injectionmap_v2

An Open source Pentesting Software for Mapping Injection points to Takeover.

https://github.com/byt3n33dl3/injectionmap_v2

Science Score: 26.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
    Found .zenodo.json file
  • DOI references
  • Academic publication links
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (18.2%) to scientific vocabulary

Keywords

automatic database-access injection injection-attacks ldap linux manipulation nosql sqlmap trust-attack
Last synced: 5 months ago · JSON representation

Repository

An Open source Pentesting Software for Mapping Injection points to Takeover.

Basic Info
  • Host: GitHub
  • Owner: byt3n33dl3
  • License: other
  • Language: C
  • Default Branch: main
  • Homepage: http://sqlmap.org
  • Size: 12 MB
Statistics
  • Stars: 53
  • Watchers: 1
  • Forks: 4
  • Open Issues: 2
  • Releases: 3
Topics
automatic database-access injection injection-attacks ldap linux manipulation nosql sqlmap trust-attack
Created almost 2 years ago · Last pushed over 1 year ago
Metadata Files
Readme License

README.md

Injectionmap_v2

Introducing Injectionmap_v2

Injectionmap_v2 is an advanced open-source penetration testing tool that automates the detection and exploitation of various types of vulnerabilities in web applications. Building on the capabilities from SQLMap Project, Injectionmap_v2 expands its scope to include not only SQL injection but also Blind SQL, NoSQL, Command, LDAP, Directory Traversal, and other Injection Attack techniques.

Python3 and C/ Master Based

Features

  • Comprehensive Injection Support: Detects and exploits SQL, Blind SQL, NoSQL, Command, LDAP, Directory Traversal, and other injection vulnerabilities.

  • Wide DBMS Support: Compatible with MySQL, Oracle, PostgreSQL, Microsoft SQL Server, SQLite, MongoDB, and many more.

  • Automated Testing: Automates the process of finding and exploiting injection vulnerabilities.

  • Advanced Techniques: Uses a variety of techniques including boolean-based blind, time-based blind, error-based, UNION query-based, stacked queries, and more.

  • Payloads and Tampering: Includes numerous payloads and tamper scripts to bypass security mechanisms.

  • Database Fingerprinting: Identifies the specific version and features of the targeted DBMS.

  • Data Extraction: Extracts data such as database schema, tables, columns, and sensitive data.

  • Command Execution: Executes arbitrary commands on the database server if privileges allow.

  • Integration: Can be integrated with other tools and scripts for enhanced security testing.

Installation

Clone the repository:

shell git clone https://github.com/byt3n33dl3/Injectionmap_v2.git cd Injectionmap_v2

Install the required dependencies:

python pip install -r requirements.txt

Usage

Injectionmap_v2 is designed to be easy to use with a command line interface, below are some example commands:

To perform a basic SQL injection test:

python python3 injectionmap -u "http://example.com/vulnerable.php?id=1"

To get a list of basic options and switches use:

python python3 injectionmap -h python3 injectionmap -hh

To get a list of all options and switches use:

shell python3 Injectionmap_v2 -hh

You can find a sample run here!.

Another injections attack modules:

  • Blind SQL Injection

  • NoSQL Injection

  • GQL Injection

  • Command Injection

  • LDAP Injection

  • Directory Traversal

Contribution

Contributions are welcome! Please submit a pull request or open an issue to discuss any changes you would like to make. License. This project is licensed under the Injectionmap_v2 General Public License. See the LICENSE file for details. Contact

Code contributors of Injectionmap_v2:

Thanks to

  • SQLMapproject
  • GangstaCrew
  • The Designer

For more informations

Visit our GitHub Organization , or contact us at byt3n33dl3@proton.me

Owner

  • Name: Sulaiman
  • Login: byt3n33dl3
  • Kind: user
  • Location: Error 403: Not on earth

I N F R A X 8 6

GitHub Events

Total
  • Create event: 1
  • Issues event: 1
  • Release event: 1
  • Watch event: 11
  • Push event: 3
Last Year
  • Create event: 1
  • Issues event: 1
  • Release event: 1
  • Watch event: 11
  • Push event: 3

Issues and Pull Requests

Last synced: 10 months ago

All Time
  • Total issues: 2
  • Total pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Total issue authors: 2
  • Total pull request authors: 0
  • Average comments per issue: 0.0
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Past Year
  • Issues: 2
  • Pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Issue authors: 2
  • Pull request authors: 0
  • Average comments per issue: 0.0
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Top Authors
Issue Authors
  • Parkerwittaker (1)
Pull Request Authors
Top Labels
Issue Labels
Pull Request Labels

Dependencies

requirements.txt pypi
  • pythonInjectionmap_v2wasstillinbeta_v *