

Once you get all exploitables check for injectables with 30 threads.Īfter SQLI Dumper finishes getting injectables select them all and search for columns such as: email, pswd, password and user. I don't recommend using site-hunter or other exploiter-hunter programs since they skip a lot. I am sure you can find a way to download it here from nulled.Īfter you get all the URLs, load them up in SQLI Dumper.īest SQLI Dumper version is 8.3 (I am sure you can download it from nulled).Īfter you load them up start the exploiter with 50 threads.

Very good tool if you know how to use it. If you don't know how to set up v3n0m you can always use DORK SEARCHER EZ. Now, here are 2 links where you can get v3n0m for LINUX (first link) and if you are too lazy to get the better version and still choose the windows version, then the second link is for you. This tool (in the best form) is available on Kali Linux, but still you can get the windows version, which is not as good.

To do this we will need a tool called V3n0m-Scanner. Once we got dorks we will need to check them and get VULNERABLE URLs that we should be able to perform SQL Injection on them and dump their database. Once you read these 2 links, you should know how to make your own SUPER HQ dorks. (If you don't wanna make dorks, you can always get onlinedorkscraper.ml) I already posted some stuff that made me a lot of haters for leaking but it is all to help you guys. (If v3n0m isn't working for you, Dork Searcher EZ will do just fine for this). Dorks, SQLI Dumper 8.3, V3n0m-Scanner and SQLmap. To dump databases and make combolists you will need to already know some stuff.
