# Detected: SQL Injection Testing Tool




**Detected** is a powerful and user-friendly tool designed to detect SQL injection vulnerabilities in web applications. It supports both GET and POST requests, custom payloads, cookies for authenticated testing, and generates detailed JSON reports.
---
## Features
- **SQL Injection Detection**: Tests input parameters for SQLi vulnerabilities.
- **GET and POST Support**: Allows testing of forms and URLs.
- **Custom Payloads**: Load payloads from a file or use the built-in library.
- **Cookie Management**: Test authenticated endpoints using cookies.
- **Detailed Reporting**: Generates a JSON report of detected vulnerabilities.
- **Multi-threading**: Tests multiple URLs and parameters simultaneously for improved efficiency.
- **Update Checker**: Notifies users of new versions.
---
## Installation
### Prerequisites
- Python 3.7 or higher
- Python libraries: `requests`, `colorama`, `tqdm`, `bs4`
### Installation Steps
1. Clone the repository:
```bash
git clone https://github.com/HackfutSec/Detected.git
cd Detected
-
Install dependencies:
pip install -r requirements.txt
-
Run the tool:
python detected.py
-
Run the tool:
python detected.py
-
Choose option
1
to test a single URL. -
Enter the URL, the parameter to test, and choose the method (GET or POST).
-
Use default payloads or load a custom payload file.
-
If needed, provide a cookie file for authenticated testing.
-
Run the tool:
python detected.py
-
Choose option
2
to test a file of URLs. -
Enter the path to the file containing URLs, the parameter to test, and choose the method (GET or POST).
-
Use default payloads or load a custom payload file.
-
If needed, provide a cookie file for authenticated testing.
Detected vulnerabilities are logged in vulnerable_urls.txt
. A detailed report is generated in report.json
.
python detected.py
1
http://example.com/page?id=1
id
1
1
n
python detected.py
2
urls.txt
id
1
1
y
cookies.json
Detected/
├── detected.py # Main script
├── requirements.txt # Python dependencies
├── payloads.txt # Example payload file
├── cookies.json # Example cookie file
├── report.json # Generated report
├── vulnerable_urls.txt # Detected vulnerable URLs
└── README.md # Documentation
Contributions are welcome! To contribute:
- Fork the repository.
- Create a branch for your feature (
git checkout -b feature/AmazingFeature
). - Commit your changes (
git commit -m 'Add some AmazingFeature'
). - Push the branch (
git push origin feature/AmazingFeature
). - Open a Pull Request.
This project is licensed under the MIT License. See the LICENSE file for details.
- HackfutSec - Lead developer
- Contributors - See the list of contributors.
- Thanks to the open-source community for the libraries used in this project.
- Inspired by popular security tools like SQLmap.
For questions or issues, open an issue on GitHub.
---
### Key Points of the README:
1. **Title and Badges**: Shows the project status (version, license, issues, etc.).
2. **Description**: Briefly explains what the tool is and its main features.
3. **Installation**: Provides clear instructions for installing and setting up the tool.
4. **Usage**: Offers practical examples for testing URLs and files.
5. **Project Structure**: Describes the organization of files in the repository.
6. **Contributing**: Encourages contributions and explains how to contribute.
7. **License**: Specifies the project license.
8. **Authors and Acknowledgments**: Recognizes contributors and inspirations.
9. **Support**: Indicates how to get help.