This script is designed to exploit blind SQL injection vulnerabilities in web applications.
- Exploits blind SQL injection vulnerabilities
- Exfiltrates data from a database
- Customizable injection points and payloads
- Clone the repository:
git clone https://github.com/ley0x/despo.git
- Install the required dependencies:
pip install -r requirements.txt
- Modify configurable variables (see Configuration section)
- Choose the injection point and update the found condition (
is_found(response)
) - Run the script:
python3 despo.py
The script can be configured by modifying the following variables:
charset
: The character set to use for exfiltration (default:0123456789abcdefghijklmnopqrstuvwxyz
)METHOD
: The HTTP method to use (default: "GET")url
: The URL of the vulnerable web application (default:https://example.com
)endpoint
: The endpoint to target (default:/fake
)params
: The URL parameters to include (default:{}
)data
: The request body data (default:{}
)cookies
: The cookies to include (default:{}
)headers
: The headers to include (default:{ "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36" }
)verbose
: Prints the log in the console (default:False
)
Check them easily by searching for TODO in the code.
Contributions are welcome! If you have any ideas or improvements, please submit a pull request.
This script is for educational purposes only. It should not be used for malicious purposes.