Skip to main content

Automated vulnerability scanner for SQL Injection (SQLi), SSRF, and XSS.

Project description

BugInjectX

BugInjectX is a powerful, Python-based tool designed for automated vulnerability discovery, focusing on SQL Injection (SQLi), Cross-Site Scripting (XSS), and Server-Side Request Forgery (SSRF) attacks. It leverages dictionary-based payload injections to identify vulnerabilities in web applications by testing URL and header parameters for potential exploits.

Features

  • Automated Vulnerability Testing: Detects SQLi, XSS, and SSRF vulnerabilities.
  • Dictionary-based Payload Injection: Uses extensive, custom dictionaries for payloads.
  • Color-coded Output: Easy-to-read, color-coded feedback in the terminal.
  • Custom Headers: Inject custom headers like X-BUG-HUNTER-ID for enhanced anonymity.
  • Async Operations: Utilizes asyncio and aiohttp for high-speed, efficient attacks.
  • Cross-Platform: Works on any system with Python 3+ installed.

Why BugInjectX?

BugInjectX is designed for bug hunters, penetration testers, and security researchers who need an efficient and streamlined method to automate vulnerability testing. With built-in support for common CVEs like SQLi, XSS, and SSRF, BugInjectX is your go-to tool for comprehensive web application testing.

Supported Vulnerabilities

  • SQL Injection (SQLi): Tests for SQLi flaws in URL and header parameters.
  • Cross-Site Scripting (XSS): Identifies XSS vulnerabilities via payload injection.
  • Server-Side Request Forgery (SSRF): Tests for SSRF vulnerabilities by injecting payloads that manipulate server-side requests.

Installation

To install BugInjectX, simply run:

pip install buginjectx

Alternatively, you can install from source:

  1. Clone the Repository:
git clone https://github.com/GreyNodeSecurity/BugInjectX
  1. Navigate to the project directory:
cd BugInjectX
  1. Install the dependencies:
pip install -r requirements.txt

If you are using some O.S. like Kali, or you get the following error;

error: externally-managed-environment

× This environment is externally managed
╰─> To install Python packages system-wide, try apt install
    python3-xyz, where xyz is the package you are trying to
    install.
    
    If you wish to install a non-Kali-packaged Python package,
    create a virtual environment using python3 -m venv path/to/venv.
    Then use path/to/venv/bin/python and path/to/venv/bin/pip. Make
    sure you have pypy3-venv installed.
    
    If you wish to install a non-Kali-packaged Python application,
    it may be easiest to use pipx install xyz, which will manage a
    virtual environment for you. Make sure you have pipx installed.
    
    For more information, refer to the following:
    * https://www.kali.org/docs/general-use/python3-external-packages/
    * /usr/share/doc/python3.12/README.venv

note: If you believe this is a mistake, please contact your Python installation or OS distribution provider. You can override this, at the risk of breaking your Python installation or OS, by passing --break-system-packages.
hint: See PEP 668 for the detailed specification.

Please use the following command:

pipx install -r requirements.txt

OR BUILD ENVIRONMENT:

python3 -m venv venv

source venv/bin/activate

Quick Start

Once installed, BugInjectX can be run with the following command:

python3 main.py

Sample Usage

  1. Run BugInjectX with custom Target:
python3 main.py --target https://target.com --header "X-BUG-HUNTER-ID: Z3r0-S3c"
  1. Test with Custom Payload Dictionaries:
python3 main.py --target https://target.com --sql-payloads /path/to/sql_payloads.txt --xss-payloads /path/to/xss_payloads.txt --ssrf-payloads /path/to/ssrf_payloads.txt

Configuration

BugInjectX allows you to specifically custom payload dictionaries for each vulnerability type (SQLi, XSS, SSRF). You can easily specify the location of these dictionaries in the command-line arguments:

  • --sql-payloads: Path to the SQLi Payloads File.
  • --xss-payloads: Path to the XSS Payloads File.
  • --ssrf-payloads: Path to the SSRF Payloads File.
  • --header: Optional custom header for your requests (e.g., X-BUG-HUNTER-ID).

Contributing

We welcome contributions! If you’d like to contribute to BugInjectX, please fork the repository, create a new branch, and submit a pull request. We are particularly looking for:

Improvements to existing features:

  • Bug fixes
  • Additional payload dictionaries for new vulnerabilities

Contact

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

buginjectx-0.1.4.tar.gz (8.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

BugInjectX-0.1.4-py3-none-any.whl (8.4 kB view details)

Uploaded Python 3

File details

Details for the file buginjectx-0.1.4.tar.gz.

File metadata

  • Download URL: buginjectx-0.1.4.tar.gz
  • Upload date:
  • Size: 8.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for buginjectx-0.1.4.tar.gz
Algorithm Hash digest
SHA256 3b806c228684b1085a0d64c9ed1b6f47990c8948d0b58b4b9f61ee9489a8b410
MD5 6a97288e1e1a39ed61b298ca4ea0a71b
BLAKE2b-256 678f37ca2775fc649d00dcdc0a1a136a3ea2a8b49650c7b8b3d7f99aa149bc48

See more details on using hashes here.

File details

Details for the file BugInjectX-0.1.4-py3-none-any.whl.

File metadata

  • Download URL: BugInjectX-0.1.4-py3-none-any.whl
  • Upload date:
  • Size: 8.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for BugInjectX-0.1.4-py3-none-any.whl
Algorithm Hash digest
SHA256 9d1e457696001797002b6078460f8cfa06c8e136045f38b603d81d87ce7885c2
MD5 5af719a050a017a745f4c8ae9a87f1fa
BLAKE2b-256 96cafd571eac7974ded1bda08d198e4db39b709c8bddab63f329c308ff7a3169

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page