# Detected: SQL Injection Testing Tool




**Detected** is a powerful and user-friendly tool designed to detect SQL injection vulnerabilities in web applications. It supports both GET and POST requests, custom payloads, cookies for authenticated testing, and generates detailed JSON reports.
---
## Features
- **SQL Injection Detection**: Tests input parameters for SQLi vulnerabilities.
- **GET and POST Support**: Allows testing of forms and URLs.
- **Custom Payloads**: Load payloads from a file or use the built-in library.
- **Cookie Management**: Test authenticated endpoints using cookies.
- **Detailed Reporting**: Generates a JSON report of detected vulnerabilities.
- **Multi-threading**: Tests multiple URLs and parameters simultaneously for improved efficiency.
- **Update Checker**: Notifies users of new versions.
---
## Installation
### Prerequisites
- Python 3.7 or higher
- Python libraries: `requests`, `colorama`, `tqdm`, `bs4`
### Installation Steps
1. Clone the repository:
   ```bash
   git clone https://github.com/HackfutSec/Detected.git
   cd Detected- 
Install dependencies: pip install -r requirements.txt 
- 
Run the tool: python detected.py 
- 
Run the tool: python detected.py 
- 
Choose option 1to test a single URL.
- 
Enter the URL, the parameter to test, and choose the method (GET or POST). 
- 
Use default payloads or load a custom payload file. 
- 
If needed, provide a cookie file for authenticated testing. 
- 
Run the tool: python detected.py 
- 
Choose option 2to test a file of URLs.
- 
Enter the path to the file containing URLs, the parameter to test, and choose the method (GET or POST). 
- 
Use default payloads or load a custom payload file. 
- 
If needed, provide a cookie file for authenticated testing. 
Detected vulnerabilities are logged in vulnerable_urls.txt. A detailed report is generated in report.json.
python detected.py
1
http://example.com/page?id=1
id
1
1
npython detected.py
2
urls.txt
id
1
1
y
cookies.jsonDetected/
├── detected.py            # Main script
├── requirements.txt       # Python dependencies
├── payloads.txt           # Example payload file
├── cookies.json           # Example cookie file
├── report.json            # Generated report
├── vulnerable_urls.txt    # Detected vulnerable URLs
└── README.md              # Documentation
Contributions are welcome! To contribute:
- Fork the repository.
- Create a branch for your feature (git checkout -b feature/AmazingFeature).
- Commit your changes (git commit -m 'Add some AmazingFeature').
- Push the branch (git push origin feature/AmazingFeature).
- Open a Pull Request.
This project is licensed under the MIT License. See the LICENSE file for details.
- HackfutSec - Lead developer
- Contributors - See the list of contributors.
- Thanks to the open-source community for the libraries used in this project.
- Inspired by popular security tools like SQLmap.
For questions or issues, open an issue on GitHub.
---
### Key Points of the README:
1. **Title and Badges**: Shows the project status (version, license, issues, etc.).
2. **Description**: Briefly explains what the tool is and its main features.
3. **Installation**: Provides clear instructions for installing and setting up the tool.
4. **Usage**: Offers practical examples for testing URLs and files.
5. **Project Structure**: Describes the organization of files in the repository.
6. **Contributing**: Encourages contributions and explains how to contribute.
7. **License**: Specifies the project license.
8. **Authors and Acknowledgments**: Recognizes contributors and inspirations.
9. **Support**: Indicates how to get help.