Various Python scripts for SQLi (MySQL, Postgresql, MSSQL)
The scripts are Time-Based blind and Boolean-Based blind SQLi scripts to bruteforce:
• Database name
• Table name
• Column names
• Data
Each script has a How to use: section at the top.
But the key changes to make to each script before use will be:
• URL endpoint of the vulnerable SQL
• Any part in the script where `CHANGE` occurs ie. `CHANGE table_name`