Git Product home page Git Product logo

dsss's People

Contributors

loveshell avatar stamparm avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

dsss's Issues

I thought something else

well i though the whole point of scanning the site was to find the vulnerability.
but in your example you have it something like this

dsss.py -u "http://www.dsss.net/id=1"

LOL and what if i don't want to search it manually?
what if i simply add something like this

dsss.py -u "http://www.dsss.net"

NOTHING HAPPENS

i want to add file

hi
please add file target on script
i want to add file target to scan on dsss

bug @ line 63

SUFFIXES[3] SUFFIXES[4] incomplete format @ line 63

line 11 must be:
SUFFIXES = ("", "-- ", "#", "%%00", "%%16")

Add pipeline mode

This is great & fast SQLi scanner. Can you please add pipeline mode to chained with other tools?

SCAN with POST DATA

Hello Stamparm,

I have tried to use this tool for a POC with POST data, but the output is like the parameters are not vulnerable. I have tried on XVWA - SQL Injection, and these parameters are effectively vulnerables.

Can you help me please, I tried the tool with this command:

python3 dsss.py -u "http://X.X.X.X/xvwa/vulnerabilities/sqli/" --data "item=&search=1"

and the output is:

  • scanning POST parameter 'item'
  • scanning POST parameter 'search'

scan results: no vulnerabilities found

Thanks

Suggestion

it would be great if it accepts list of urls and multiple parameters.

thanks for great work.

Why set FUZZY_THRESHOLD = 0.95 ?

FUZZY_THRESHOLD = 0.95 
vulnerable = all(ratios.values()) and min(ratios.values()) < FUZZY_THRESHOLD < max(ratios.values()) and abs(ratios[True] - ratios[False]) > FUZZY_THRESHOLD / 10

I am confused about this part of the code.

Can you explain the reason for this judgment? Thank you very much~

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.