Skip to content


Folders and files

Last commit message
Last commit date

Latest commit



34 Commits

Repository files navigation


A tool to extract database data from a blind SQL injection vulnerability -- i.e., one that displays success or failure in some way, but does not actually print any data from the database. Note that this tool will not find the vulnerabilities for you; it is assumed one has already been found. This tool will only exploit a given vulnerability to extract data.

Note that at the moment, bitdump is only supported for MySQL databases.

When not to use bitdump

Since bitdump has to extract data 1 bit at a time, it is an extremely slow method of reading data. You should probably first check to see if the data may be obtained by other means.


Bitdump requires Python 3.2 or later.

Usage url success attackfield [otherfield, [otherfield ...]]

  • url is the vulnerable injection endpoint.

  • success is a string that is only present in a response from a successful query (i.e., one that returns at least one row). This string must not be present in responses from malformed or unsuccessful (empty-result) queries. bitdump uses this string to determine its 1 bit of data per query.

  • attackfield is the name of the vulnerable field. For example, if the url is vulnerable to sql injection in the "username" field, then this should be "username".

  • otherfield is any other field that must be present in the request in order for it to be successful. By default, all of these fields' values will be set to "" (an empty string). To assign a different value, use field:value.

    For example, to assign "root" to parameter "username", use username:root


Bitdump additionally supports the following optional flags:

  • -h will print basic usage information.

    Alias: --help

  • -o [OUTFILE] will print the results of the dump to OUTFILE upon completion.

    Alias: --outfile, --out

  • -d [DELAY] will pause for DELAY ms before sending each query.

    Alias: --delay

  • -n [MAX_THREADS] will spawn up to MAX_THREADS threads so requests may be made asynchronously.

    Alias: --max_threads

  • -t will only dump available table names, not their structure or contents.

    Alias: --tables_only

  • -T [TABLE] will only dump the contents of TABLE. To specify the table's schema, prepend with a period: SCHEMA.TABLE. If no schema is specified, the current (default) will be used.

    Alias: --dump_table

    • -w [WHERE] will add WHERE as a where clause when dumping the contents of TABLE. Requires -T.

      Alias: --where

    • --fieldeq [FIELD] [VALUE] will only dump records in which FIELD equals VALUE. Requires -T.

      See Also:

      • --fieldlike (FIELD LIKE %VALUE%)
      • --fieldlt (FIELD < VALUE)
      • --fieldgt (FIELD > VALUE)
      • --fieldlte (FIELD <= VALUE)
      • --fieldgte (FIELD >= VALUE)
  • -f [FILE] will attempt to dump the contents of FILE instead of database contents. Note that for this to be successful, the database user must have LOAD_FILE() permissions and must have read permissions on the file specified.

    Alias: --file

  • --get will use GET requests instead of POST requests when contacting the target host.

  • -c [KEY]=[VALUE] [KEY]=[VALUE] ... will add a cookie for each KEY=VALUE pair to each request, for use e.g. when a vulnerable form requires prior authentication.

    Alias: --cookie

  • -v is used to indicate the amount of logging output to display while running the script (either -v or -vv). If no verbose flag is given, no logging output will be displayed (but the final database structure will still be printed when the script completes).

    Alias: --verbose


A tool to extract database data from a blind SQL injection vulnerability.







No releases published


No packages published