A lightweight, boolean-based SQL injection exploitation tool designed for stealth and efficiency.
Why another SQLi tool?
- 🤫 Quiet Detection: Avoiding WAF blocks with low-noise scanning.
- 🎯 Specific Exploitation: Automating the painful boolean-based extraction when
sqlmapfails or is too noisy.
- 🕵️ Low-Noise Detections: Detect potential SQLi vulnerabilities considering the existence of WAFs.
- 🔑 Critical Data Finder: Smartly locates sensitive columns (
password,email,token) automatically. - ⚡ Binary Search Extraction: Extracts data bit-by-bit using binary search for maximum speed.
- 🧠 Smart Caching: Remembers database fingerprints per host to save requests.
- 🌐 Multi-Database Support: MySQL, MSSQL, PostgreSQL, Oracle.
- 🔌 Proxy Support: Easy integration with Burp Suite and other proxy tools.
The detection engine uses a simple approach to identify SQLi with minimal false positives and avoiding WAF blocks:
-
Quote-Based Detection: Tests
'vs''vs'''. -
Concat/Math Payload Testing: Generates payloads using common testing values like
admin,1,0, together with SQL concat operators:apple→a'||'pple,a'+'pple,a' 'pple. For numeric values, also tests math:2→4-2. Then, a garbage baseline filters out error pages. SQLi is only flagged if the payload response matches the original value and differs from the garbage response.
go install github.com/morkin1792/flatsqli@latest# or
# git clone https://github.com/morkin1792/flatsqli && cd flatsqli && go build -o flatsqli .- From a list of URLs:
flatsqli detect -uf urls.txt -o results.md- From raw request files:
flatsqli detect -rd requests/ -o results.md -v- Find sensitive data automatically (Recommended):
flatsqli exploit -rf req.txt -fid -o output.md❯ ./flatsqli --help
_____ _ _ ____ ___ _ _
| ___| | __ _| |_/ ___| / _ \| | (_)
| |_ | |/ _` | __\___ \| | | | | | |
| _| | | (_| | |_ ___) | |_| | |___| |
|_| |_|\__,_|\__|____/ \__\_\_____|_|
SQLi Exploitation Tool v1.1.1
Lightweight & WAF-Friendly
Usage: flatsqli <command> [options]
Commands:
exploit Exploit a confirmed SQLi vulnerability to extract data
detect Detect potential SQLi vulnerabilities in URLs or requests
Run 'flatsqli <command> --help' for more information on a specific command.
General Options:
-o, -output <file> Output file path (markdown format)
-H, -header <header> Custom header (can be used multiple times)
-proxy <url> Proxy URL (e.g., http://127.0.0.1:8080)
-timeout <seconds> Request timeout in seconds (default: 10)
-ph, -plain-http Use plain HTTP instead of HTTPS
-v, -verbose Enable verbose output
Examples:
flatsqli exploit -rf req.txt -fid -o output.md
flatsqli detect -uf urls.txt -o results.md
flatsqli detect -rd requests/ -v