Skip to content

Latest commit

 

History

History
85 lines (63 loc) · 1.83 KB

File metadata and controls

85 lines (63 loc) · 1.83 KB

SQL Injection Obfuscation Tool - SQLBYPASS

Project Specification


Purpose

Advanced SQL injection payload obfuscation tool to bypass WAF and security filters.


Features

1. Obfuscation Techniques

Technique Description Example
Char Encoding URL encoding, Hex, Base64 '%27
Case Variation Random case mixing UNIONuNiOn
Comment Injection Inline comments UN/**/ION
Whitespace Tabs, newlines, comments UNION SELECT
Encoding Chars HTML entities, Unicode <&lt;
Double Encoding Multiple URL encoding %2527
Type Casting Implicit type changes '='''=''

2. WAF Detection

  • Detect common WAFs (Cloudflare, Akamai, etc.)
  • Test fingerprinting
  • Bypass suggestions

3. Payload Generation

  • Custom payload builder
  • Pre-defined payloads for each DB type
  • Random mutation

4. Attack Modes

  • UNION-based
  • Boolean-based blind
  • Time-based blind
  • Error-based

Architecture

sqlbypass/
├── main.py              # Entry point
├── core/
│   ├── obfuscator.py    # Core obfuscation engine
│   ├── detector.py     # WAF detection
│   └── payloads.py      # Payload database
├── utils/
│   ├── encoder.py       # Encoding utilities
│   └── fuzz.py          # Fuzzing engine
└── tests/
    └── test_obfuscation.py

Example Usage

# Basic obfuscation
python sqlbypass.py -p "UNION SELECT 1,2,3--"

# With WAF bypass
python sqlbypass.py -p "admin' OR '1'='1" --bypass-level=high

# Detect WAF first
python sqlbypass.py -u "http://target.com" --detect-waf

Output

  • Console output
  • Export to text/JSON
  • Save to file

Created: 2026-04-08 For Educational Purposes Only!