ghauri v1.1.8 releases: automates the process of detecting and exploiting SQL injection
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws
- Supports the following types of injection payloads:
- Boolean based.
- Error Based
- Stacked Queries
- Support SQL injection for following DBMS.
- Microsoft SQL Server
- Supports following injection types.
- GET/POST-Based injections
- Headers Based injections
- Cookies Based injections
- Multipart Form data injections
- JSON based injections
- support proxy option –proxy.
- supports parsing requests from txt files: switch for that -r file.txt
- supports limiting data extraction for dbs/tables/columns/dump: switch –start 1 –stop 2
- Added switch for performing tests based on title(s)
- Added further data retrieval payloads.
- Updated code for confirming character(s) when
- clone the repo: git clone https://github.com/r0oth3x49/ghauri.git
- install requirements: pip install –upgrade -r requirements.txt
- run: python setup.py install or python -m pip install -e .
Copyright (c) 2022-2025 Nasir Khan